The users directory is off limits if you follow my installation
instructions. It's true that you can still eavesdrop but I hardly think it
is a problem. Compare this with handing over a credit card at the
restaurant. Do you really know if your credit card wasn't swiped twice, or
how about that checking account number which is on your check.

I think we seem to forget that it is easier for a crook to get information
from a shady clerk than it is to drive around the neighbourhood listening
in on airwaves or wiretap a phone line.


Dieter Simader    http://www.sql-ledger.org   (780) 472-8161
DWS Systems Inc.     Accounting Software       Fax: 478-5281
=========== On a clear disk you can seek forever ===========

On Mon, 11 Nov 2002, Mark Hedges wrote:

>
>
> If the encrypted password can be read by the web server from
> users/members, and the encrypted password is the string used to
> authenticate in the get/post requests, it seems like there is no
> real security provided by the encryption, because the encrypted
> string is used as the secret, rather than the unencrypted
> password... and it isn't very secret.
>
> To be useful, it seems like the unencrypted password should be
> used to login, and then a one-time session-id hash should be
> generated to maintain authenticity for a single session in the
> get/post requests.  Access via command line should require an
> initial login with the actual secret password to obtain the
> session-id hash which is good for a limited time and corresponds
> to an IP address.  This way an eavesdropper cannot simply pull
> the encrypted password string from the members file to use for
> access.  They would have to know the actual password, which is
> the point of the encryption.
>
> Apache::Session and CGI::Session are mature CPAN packages that
> can handle this in a secure way.
>
> --mark--
>
>



Reply via email to