On Tue, Jun 21, 2011 at 4:02 AM, André Brunnsberg < andre.brunnsb...@planmill.com> wrote:
> But if the user has the session then he or she can change the user > credentials Actually it depends on how application that implement password change. Usually for changing the password you need to enter the current password also. > (of course only for this site unless the password is shown in > the system, which would be really bad) or if the user has enough rights > add a new user which can be used by the hacker. > If we start speculating we can reach any scenario.. You are telling me IF the system has a user registration use case and IF the hacker HAPPENS to get an admin session, he can add a new user. That the hacker can do if the user go for a walk and forget to look the screen too. > Remember how easy it is to hijack cookie files under normal HTTP with the > Firesheep extension for Firefox. > I am not trying to prevent session hijacking. That's not a requirement for this system. The requirement is to secure the user password. I believe this is a meaningful requirement. > Cheers, > André > > -----Original Message----- > From: Rafael Liu [mailto:rafael...@gmail.com] > Sent: den 21 juni 2011 03:12 > To: Tomcat Users List > Subject: RE: Setting SSL for login pages > > Good point Chuck. I agree with you, the webapp wouldn't be all secured. > But there are 2 different things here: > > * the issue with the plain password > * the issue with session hijacking > > The first one first gives the hacker a private information about the user > (which can even the used by the user somewhere else). The hacker will have > the actual user's credentials, and will be able to login at will. > > The second one doesn't necessarily exposes user's informations. The hacker > can pretend to be the user, but only for the time of the session. Even tho > there are tricks to keep the session alive [almos] forever, this is > essentially different from having the user's credential. > > I see them at different levels of security. Using the same logic, one can > say that there's no point in using DIGEST authentication if there's still > room for session hijacking. Much like BASIC / DIGEST or CONFIDENTIAL / > INTEGRAL provides different levels of security, I think the two cases > mentioned also do.Giving these kind of options to the webapp can make NFR > (like performance) easier to meet and infrastructure easier to configure > (like rewriting on Apache). > > What do you think? > > On Jun 20, 2011 6:50 PM, "Caldarale, Charles R" > <chuck.caldar...@unisys.com> > wrote: > >> From: Rafael Liu [mailto:rafael...@gmail.com] > >> Subject: Setting SSL for login pages > > > >> I think it would be natural something like this: > > > >> <security-constraint> > >> <web-resource-collection> > >> <web-resource-name>SSL login</web-resource-name> > >> <url-pattern>/login/*</url-pattern> > >> </web-resource-collection> > >> <user-data-constraint> > >> <transport-guarantee>CONFIDENTIAL</transport-guarantee> > >> </user-data-constraint> > >> </security-constraint> > > > > The login pages are usually not specified in the <url-pattern>; only > > the > pages to be protected. Login pages are not normally directly accessed by a > user, but are only presented when the user attempts to access a protected > page. > > > >> As I see, the way it is, all authenticated pages must be set to > >> CONFIDENTIAL also > > > > Not also, instead. > > > >> But if the user IS authenticated he is forced to use HTTPS too, and > >> that I was trying to avoid. > > > > Think about it: if the secure traffic is only for the login page, > > anyone > could access the not-really-protected pages by sniffing the sessionid used > on the unsecure connection - you would have no security. > > > > - Chuck > > > > > > THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE > > PROPRIETARY > MATERIAL and is thus for use only by the intended recipient. If you > received this in error, please contact the sender and delete the e-mail > and its attachments from all computers. > > > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > > For additional commands, e-mail: users-h...@tomcat.apache.org > > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > > -- Rafael Liu +55 61 9608-7722 http://rafaelliu.net