Hello Chris,

thanks for the detailed information appreciate it.

chriii...@gmail.com schrieb am Donnerstag, 24. November 2022 um 03:24:06 
UTC+7:

> Hello. 
>
> TLS is enough to encrypt and secure the connection, the whole point of 
> HTTPS protocol is to make a clear text channel secure. 
>
> If someone is sniffing your HTTPS connection, will be not able to read the 
> traffic, except if the attacker performs a Man In the Middle and replace 
> the TLS certificate like burpsuite do, but  if something like that happens, 
> there is no point to hash the username and password because capturing the 
> cookie session will be enough to enter the application, or even reutilizing 
> the transmitted hash.
>
> I'm not aware of any mechanism in web2py to hash the username/password. 
> Maybe you can achieve this by adding some javascript code that hash these 
> values when click on submit, and probably you will have to modify an 
> internal component in web2py to make the auth validation able to read your 
> hashed data.
>
> I've been working in the world of cyber security for a lot of years.... 
> and most of the times when someone point this like a vulnerability is 
> because probably he doesn't understand really well the materia and make an 
> alarm for something that is already protected. In this case HTTPS is 
> enough. If your cyber security officer is saying that the app is not 
> protected even using HTTPS and gives you examples with burpsuite, is clear 
> that he/she does not understand why burpsuite is able to decrypt data (due 
> their own certificate) and will think that everything is unencrypted.
>
> I've some banks  that like to hash the transmitted data even with the 
> HTTPS protection. But again... this is not really secure because hashing 
> data before sending, would need to be performed in the browser via 
> javascript and if the hash process happens in the client side, you can see 
> how encryption is made and reverse it . Even if javascript functions are 
> obfuscated, you just have to put some breakpoints on the javascript console 
> (browser console) and catch events until you find where the hashing process 
> is made, and perform a reverse of that function.
>
>
> Cheers.
> Chris,
>
> El mié, 23 nov 2022 a las 15:59, Arglanir (<argl...@gmail.com>) escribió:
>
>> Hello,
>> It is a big question, and does not concern only web2py. You can find 
>> people asking the same general question in StackOverflow. And the aswers 
>> are generic : The most important is the TLS communication.
>>
>> https://security.stackexchange.com/questions/110415/is-it-ok-to-send-plain-text-password-over-https
>>  
>> (and see linked duplicate questions)
>> Do you know any website that does hash the password client-side ?
>> Arglanir
>>
>>
>> Le mardi 22 novembre 2022 à 01:20:06 UTC+1, silvia...@gmail.com a écrit :
>>
>>> Thank you, but do you have any suggestions what to do cause our 
>>> cybersecurity officer keeps complaining about that wo I need change some 
>>> settings in web2py or do you have an idea how I can sort it out ? 
>>>
>>> Kind regards
>>>
>>> Am Di., 22. Nov. 2022 um 02:23 Uhr schrieb Christian Varas <
>>> chriii...@gmail.com>:
>>>
>>>> Hi, 
>>>> It's OK, it's the way it works, If you put s local proxy like burp and 
>>>> then you go and capture traffic, it is ok that you can see clear text data 
>>>> because burp proxy puts their own certificate between client and backend, 
>>>> because of that burp proxy can decrypt and show you clear text data. If 
>>>> you 
>>>> sniff with a packet capture like wireshark, you will see everything is 
>>>> encrypted.
>>>>
>>>> Salting your password/username before sending it is not really secure, 
>>>> because hashing the username/password before sending, would need to be 
>>>> performed in the browser via javascript and if the hash process happens in 
>>>> the client side, you can see how encryption is made and reverse it .
>>>>
>>>> Cheers.
>>>> Chris.
>>>>
>>>> El lun, 21 nov 2022 a las 5:01, Silvian “Top 10 Answers” Cedru (<
>>>> silvia...@gmail.com>) escribió:
>>>>
>>>>> Its weird why does web2py do not salt username and password before 
>>>>> sending it ?
>>>>>
>>>>> Silvian Cedru schrieb am Montag, 21. November 2022 um 09:25:05 UTC+7:
>>>>>
>>>>>> Here is a screenshot after sniffing the network and it is weird since 
>>>>>> it has HTTPS I thought you could not sniff out the password when someone 
>>>>>> logs ins so I need to salt or Hash it but I am not sure where I find the 
>>>>>> file and what to change . Would be awesome if someone could help.
>>>>>>
>>>>>> Silvian Cedru schrieb am Donnerstag, 17. November 2022 um 11:05:34 
>>>>>> UTC+7:
>>>>>>
>>>>>>> Hello everyone ,
>>>>>>>
>>>>>>> I just found out that when you login in my application my password 
>>>>>>> gets send in plain text even I thought it gets hashed does someone know 
>>>>>>> a 
>>>>>>> solution how to salt or hash the password before sending ?
>>>>>>>
>>>>>>>
>>>>>>> -- 
>>>>> Resources:
>>>>> - http://web2py.com
>>>>> - http://web2py.com/book (Documentation)
>>>>> - http://github.com/web2py/web2py (Source code)
>>>>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>>>>> --- 
>>>>> You received this message because you are subscribed to the Google 
>>>>> Groups "web2py-users" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>>> an email to web2py+un...@googlegroups.com.
>>>>> To view this discussion on the web visit 
>>>>> https://groups.google.com/d/msgid/web2py/3b380bb2-b908-4e8e-be5a-bc465196c38fn%40googlegroups.com
>>>>>  
>>>>> <https://groups.google.com/d/msgid/web2py/3b380bb2-b908-4e8e-be5a-bc465196c38fn%40googlegroups.com?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>> -- 
>>>> Resources:
>>>> - http://web2py.com
>>>> - http://web2py.com/book (Documentation)
>>>> - http://github.com/web2py/web2py (Source code)
>>>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>>>> --- 
>>>> You received this message because you are subscribed to the Google 
>>>> Groups "web2py-users" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>> an email to web2py+un...@googlegroups.com.
>>>>
>>> To view this discussion on the web visit 
>>>> https://groups.google.com/d/msgid/web2py/CA%2Bs%2BuJv2ddys7nQV5%3DCu7xbM%3DQ-vqu09%3DDL2ZMHoN2TNBYsO7A%40mail.gmail.com
>>>>  
>>>> <https://groups.google.com/d/msgid/web2py/CA%2Bs%2BuJv2ddys7nQV5%3DCu7xbM%3DQ-vqu09%3DDL2ZMHoN2TNBYsO7A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>> -- 
>> Resources:
>> - http://web2py.com
>> - http://web2py.com/book (Documentation)
>> - http://github.com/web2py/web2py (Source code)
>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "web2py-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to web2py+un...@googlegroups.com.
>>
> To view this discussion on the web visit 
>> https://groups.google.com/d/msgid/web2py/f5bbb64a-e5c0-4f06-bb5b-7dc529b97e45n%40googlegroups.com
>>  
>> <https://groups.google.com/d/msgid/web2py/f5bbb64a-e5c0-4f06-bb5b-7dc529b97e45n%40googlegroups.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to web2py+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/web2py/a92382d9-9fb3-4802-b93a-26790e98efd9n%40googlegroups.com.

Reply via email to