If the encrypted password can be read by the web server from
users/members, and the encrypted password is the string used to
authenticate in the get/post requests, it seems like there is no
real security provided by the encryption, because the encrypted
string is used as the secret, rather than the unencrypted
password... and it isn't very secret.

To be useful, it seems like the unencrypted password should be
used to login, and then a one-time session-id hash should be
generated to maintain authenticity for a single session in the
get/post requests.  Access via command line should require an
initial login with the actual secret password to obtain the
session-id hash which is good for a limited time and corresponds
to an IP address.  This way an eavesdropper cannot simply pull
the encrypted password string from the members file to use for
access.  They would have to know the actual password, which is
the point of the encryption.

Apache::Session and CGI::Session are mature CPAN packages that
can handle this in a secure way.

--mark--


Reply via email to