Hi,

Khawaja Shams schrieb:
Hello everyone,
I have a few strict requirements for security on my project, and I am having
a hard time understanding some concepts. I cannot use SSL due to the
performance loss, and the application must be accessed only by authenticated
users. Meanwhile, I am required to never send the password in cleartext. I
have successfully implemented a DIGEST authentication with the helpful
response from Mark Thomas, but I am curious about how authentication for
further requests takes place. I notice that the user is prompted for the
password only the first time, and subsequent requests are automatically
authenticated. Is the authentication information stored in a session
somewhere?

The browser caches your username and (digested) credentials and sends them with each request in a HTTP request header. If you close your browser, the information are cleared, unless you tell your browser to memorize them.

Is this easy to obtain through sniffing? Could a sniffer
potentially fake an authenticated client's session id to get access to an
application?

Yes, A sniffer only needs to capture only one request with your username/credentials and may subsequently misuse them for accessing the webapp.

DIGEST is nearly as weak as BASIC/FORM, the only difference is, that the password is going through a hash function, which creates a digest of your password, from which the original password can not be restored.

For optimal security SSL is a good option.

Peter


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to