[4539] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Basic Authentication

daemon@ATHENA.MIT.EDU (Brian W. Spolarich)
Thu Feb 20 18:04:14 1997

Date: Thu, 20 Feb 1997 15:34:09 -0500 (EST)
From: "Brian W. Spolarich" <briansp@ans.net>
To: Aaron Abelard <aarona@iquest.net>
cc: Jim Harmon <jim@telecnnct.com>, www-security@ns2.rutgers.edu
In-Reply-To: <Pine.SV4.3.91.970220084052.24549E-100000@iquest4>
Errors-To: owner-www-security@ns2.rutgers.edu

On Thu, 20 Feb 1997, Aaron Abelard wrote:

| Here's something very on topic for www-security.  According to the HTTP/1.0
| specification (http://www.ics.uci.edu/pub/ietf/http/rfc1945.html#AA) the 
| username and password used in Basic Authentication is sent as clear 
| text.  Does this not allow for the possibility of the information being 
| snooped?  Also, are there any authentication schemes in use other than 
| Basic?  

  That's quite true, and a Known Problem for HTTP/1.0.  The data is sent
Base64-encoded, but certainly not encrypted, and snoopable.  But no more
or less snoopable than much of the authentication that's done out there.

  There's support in HTTP/1.1 [RFC2068] for MD5-based digest
authentication [RFC2069], which does not transmit the password in the
clear.  I'm not aware of any publicly-available servers and clients which
do this, though.  There's also the choice of doing Basic authentication
over an SSL-encrypted session, which is safe from eavesdropping, and is
currently implementable.

| Its one thing to have someone circumvent your security to download free 
| nudies.  To have them rooting through your confidential and proprietary 
| corporate information is another thing altogether.

  Indeed.

--
Brian W. Spolarich - ANS Systems Development - briansp@ans.net - 313-677-7311
       At the sight of Nothing the Soul rejoices.  -- Thomas Moore


home help back first fref pref prev next nref lref last post