On Tuesday, April 21, 2015 at 3:56:31 PM UTC+2, Mike Hoye wrote:
> On 2015-04-21 6:43 AM, Roger Hågensen wrote:
> > I know, not that well explained and over simplified. But the concept 
> > is hopefully clear, but in case it's not...
> For what it's worth, a lot of really smart people have been thinking 
> about this problem for a while and there aren't a lot of easy buckets 
> left on this court. Even if we had the option of starting with a clean 
> slate it's not clear how much better we could do, and scrubbing the 
> internet's security posture down to the metal and starting over isn't 
> really an option. We have to work to improve the internet as we find it, 
> imperfections and tradeoffs and all.

How about HTTP/2 ?
Also a lot of smart minds completely ignored HTTP Digest Authentication for 
years, allowing Basic (plain text) password to be sent when login in on sites.

I hate plain text logins, how many blogs and forums out there have plain text 
logins right now? The number is scary I'm sure.
MITM attacks are one thing, what is worse are network eavesdropping, login to 
your blog or forum from a Cafe and you are screwed basically. IT has been shown 
that despite using WPA2 to the router, others on the same router can catch 
packets and decrypt them. And then they have your login/password.

Now when I make logins for web projects I use a Javascript client side based 
HMAC and a challenge-response so I do not even send the HMAC/hash over the 
network.

The server gives the javascript/client a challenge and a nonce, the password 
which the user knows and server knows (actually the server only knows a hmac of 
the pass and salt) is used with the challenge and then the result is sent back 
as a answer.
An eaves dropper will not be able to get the password.

Now, there are other attacks that could be used like session exploits but this 
is true even for HTTPS connections.

And a javascript/client solution like this is open to a MITTM attack since it's 
not encrypted or signed in any way (code signing certificates are even more 
expensive than site certificates).

I'd like to see a Client based HMAC Challenge-Responsive built in and a way for 
a browser and a serverside script to establish a encrypted connection without 
he need for certificates.
This would solve the plaintext login headache, and would be attractive to sites 
that only have HTTP (no HTTPS option) but has for example PHP support or some 
other scripting language.

HTTP/2 could be extended to improve the way HTTP Digest Authentication works, 
adding a HMAC(PSWD+SALT) + Challenge(NONCE) = Response(HASH) method.
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to