[3811] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Cookie question

daemon@ATHENA.MIT.EDU (Roberto Galoppini)
Mon Dec 16 07:18:41 1996

Date: Mon, 16 Dec 1996 11:37:24 +0100
From: Roberto Galoppini <rgaloppini@tim.it>
Reply-To: rgaloppini@tim.it
To: Steven Bellovin <smb@research.att.com>
CC: "David W. Morris" <dwm@xpasc.com>, "David B. Donahue" <ddonahue@emf.net>,
        David Ray <daver@idiom.com>, www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

>          On Fri, 13 Dec 1996, David B. Donahue wrote:
> 
>          > In this way, even though the underlying password wasn't read-able in
>          the
>          > cookie,
>          > because all cookie passwords (in this config) are decrypted the same
>          > way, the
>          > encypted password simply becomes the password.
> 

Steven Bellovin wrote:
>
 > If the cookie file, or lines of it, are stored encrypted under some
key,
> it's reasonably safe from theft, since that encrypted form is not transmitted.

Me: 
What do you think about reducing the 'path of trust' from end-to-end
to user-to-browser ? A plug-in or whatever else you like could manage
passwords kept in the cookies file, bringing part of the security
mechanism at browser level, for example using challenge-reponse.
Of course software browser-based should be trusted.

Roberto Galoppini
rgaloppini@tim.it
"Web wasn't supposed to be safe, like everything else"

home help back first fref pref prev next nref lref last post