[3617] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: .htaccess created by CGI script...

daemon@ATHENA.MIT.EDU (L. Lopshire)
Sat Nov 23 18:10:16 1996

Date: Fri, 22 Nov 1996 19:28:15 -0800 (PST)
From: "L. Lopshire" <ayn@pacifier.com>
To: sameer <sameer@c2.net>
cc: Harris Demel <HARRIS@novell.com>, www-security@ns2.rutgers.edu
In-Reply-To: <199611220742.XAA02763@atropos.c2.org>
Errors-To: owner-www-security@ns2.rutgers.edu

I agree!  Use SSL and add a FIREWALL.


On Thu, 21 Nov 1996, sameer wrote:

>Date: Thu, 21 Nov 1996 23:42:45 -0800 (PST)
>From: sameer <sameer@c2.net>
>To: Harris Demel <HARRIS@novell.com>
>Cc: www-security@ns2.rutgers.edu
>Subject: Re: .htaccess created by CGI script...
>
>> 
>> IP spoofing is very easy to do with .htaccess files, especially within an
>> intranet (people on same subnets).  Using passwords would be more
>> secure than IP addresses (or machine names) but again, people could
>> sniff the passwords off the wire as they are sent in clear-text.
>
>	Use SSL and client certs. Secure, powerful, and flexible.
>
>-- 
>Sameer Parekh					Voice:   510-986-8770
>President					FAX:     510-986-8777
>C2Net
>http://www.c2.net/				sameer@c2.net
>


home help back first fref pref prev next nref lref last post