lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu Mar 16 17:10:23 2006
From: gem at rellim.com (Gary E. Miller)
Subject: HTTP AUTH BASIC monowall.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yo Simon!

On Thu, 16 Mar 2006, Simon Smith wrote:

>     Encoding a username and password combination using base64 is not
> secure, but, I understand why it is encoded in base64. Having said that,
> I am trying to discover/create an alternate method for authentication
> that is secure even if the SSL pipe is compromised.

If you do not like HTTP AUTH in SSL then why not just step up to HTTP
AUTH DIGEST?

http://httpd.apache.org/docs/2.2/mod/mod_auth_digest.html

RGDS
GARY
- ---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
	gem@...lim.com  Tel:+1(541)382-8588

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (GNU/Linux)

iD8DBQFEGZvp8KZibdeR3qURAu3+AKD3GWCYBGSSKTDPtrEyWFXsb4AnvACgoPbS
Zosdi9zPVZO25tsl8nGsRkM=
=8/g1
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ