[2232] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Final Review of Digest Authentication

daemon@ATHENA.MIT.EDU (hallam@Etna.ai.mit.edu)
Mon Jun 10 23:03:48 1996

From: hallam@Etna.ai.mit.edu
To: "Paul Leach <paulle@microsoft.com> \"'www-security@ns2.rutgers.edu'\""  <www-security@ns2.rutgers.edu>,
        "'http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com'" 	 <http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com>,
        "'John Franks'" 	 <john@math.nwu.edu>
Cc: hallam@Etna.ai.mit.edu
Date: Mon, 10 Jun 96 20:49:17 -0400
Errors-To: owner-www-security@ns2.rutgers.edu


Paul writes:

>  Both Basic and Digest authentication are vulnerable to "man in the
>  middle" attacks, for example, from a hostile or compromised proxy.
>  Clearly, this would present all the problems of eavesdropping.  But
>  it could also offer some additional threats.

This isn't quite right. Digest authentication is not vulnerable
to a man in the middle attack as described. Digest is vulnerable to
a downgrade attack where a client supports BASIC and BASIC is
vulnerable to man in the middle.

If a client does not support Digest the vulnerability to password 
snooping goes away beacuse a client will not divulge the password under
any circumstances.

Its a picky point but an important one.

	Phill

home help back first fref pref prev next nref lref last post