Hey Chris, as you said, each problem compromise different kinds of things: account vs credentials. And I think they have different kind of consequences and can be, each one , dangerous its own way. I brought the discussion into the list because I thought it was relevant.
Looking at the code, a fix would be quite simple: replacing the forward() by a send(). To have the same behaviour as today to the end user, a few more things should be done, because we would be changing from a POST to a GET, but AFAIK it's a matter of saving the target URL as a request parameter. Back button, bookmark and normal login should work. I agree it's kind of a philosophical question but I see some real implications. Anyway, for the record, as a quick and dirty fix I set the full URL with https schema in /form@action. But the hosting page isn't HTTPS and the user may feel unsecure.. On Tue, Jun 21, 2011 at 11:46 AM, Christopher Schultz < ch...@christopherschultz.net> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Rafael, > > On 6/20/2011 8:12 PM, Rafael Liu wrote: > > Good point Chuck. I agree with you, the webapp wouldn't be all secured. > But > > there are 2 different things here: > > > > * the issue with the plain password > > * the issue with session hijacking > > This does become somewhat of a philosophical question. I agree that > credentials should always be secured. If the service itself is not > particularly sensitive, I think it's acceptable to use SSL only during > authentication. > > Be aware that some authentication schemes (i.e. HTTP Auth) send > credentials on every request, not just the first time they are challenged. > > > The first one first gives the hacker a private information about the user > > (which can even the used by the user somewhere else). The hacker will > have > > the actual user's credentials, and will be able to login at will. > > > > The second one doesn't necessarily exposes user's informations. The > hacker > > can pretend to be the user, but only for the time of the session. Even > tho > > there are tricks to keep the session alive [almos] forever, this is > > essentially different from having the user's credential. > > If the system doesn't require the existing password to be supplied > (again, in SSL!) in order to do things like change the password, then an > attacker can hijack the session and then hijack the account. The > credentials are still safe, but the account is not. > > > I see them at different levels of security. Using the same logic, one can > > say that there's no point in using DIGEST authentication if there's still > > room for session hijacking. Much like BASIC / DIGEST or CONFIDENTIAL / > > INTEGRAL provides different levels of security, I think the two cases > > mentioned also do. Giving these kind of options to the webapp can make > NFR > > (like performance) easier to meet and infrastructure easier to configure > > (like rewriting on Apache). > > +1 > > The right answer is: always think about what you are doing. > > - -chris > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.10 (MingW32) > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ > > iEYEARECAAYFAk4Arq8ACgkQ9CaO5/Lv0PB4VwCgvU23AGCJ/8ChMOJ/RsWuM3zG > hxQAoKykpgMpWlPX3wL52zi+N0gQep9c > =xeZL > -----END PGP SIGNATURE----- > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > > -- Rafael Liu +55 61 9608-7722 http://rafaelliu.net