[3097] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Any known holes in .htaccess/.htpasswd directory security?

daemon@ATHENA.MIT.EDU (Holger Reif)
Thu Sep 26 16:49:33 1996

Date: Thu, 26 Sep 96 20:51:53 +0200
From: Holger.Reif@PrakInf.TU-Ilmenau.DE (Holger Reif)
To: www-security@ns2.rutgers.edu, Steff.Watkins@Bristol.ac.uk,
        JOHNAL@attachmate.com
Errors-To: owner-www-security@ns2.rutgers.edu

Steff Watkins:
> "In Basic HTTP Authentication, the password is passed over the network not
> encrypted but not as plain text -- it is "uuencoded."

To be exactly: base64 encoded.

> Anyone watching
> packet traffic on the network will not see the password in the clear, but
> the password will be easily decoded by anyone who happens to catch the
> right network packet." 

> However, this still does NOT negate that fact that a user, intent on
> entry, may be able to pull the htpasswd file and then use 'crack' on it
> instead!!!

Right. The entries are encrypted using the crypt(3) routine and therefore 
vulnerable to dictinary attacks.

John Allen:
> Eh? I created my .htpasswd file by cut and pasting my encrypted password
> from /etc/passwd ??!! And that file works just fine on my NCSA web
> server on my desk here at work??!! What system are you using?

Not nessecarily a good idea but if you use that password for unprotected telnet
over some network too than you don't increase you risk of getting sniffed.


read you later  -  Holger Reif
----------------------------------------  Signaturprojekt Deutsche Einheit
TU Ilmenau - Informatik - Telematik                      (Verdamp lang her)
Holger.Reif@PrakInf.TU-Ilmenau.DE         Alt wie ein Baum werden, um ueber
http://Remus.PrakInf.TU-Ilmenau.DE/Reif/  alle 7 Bruecken gehen zu koennen


home help back first fref pref prev next nref lref last post