/[suikacvs]/webroot/www/2004/id/draft-lawrence-digest-request-00.txt
Suika

Contents of /webroot/www/2004/id/draft-lawrence-digest-request-00.txt

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.1 - (hide annotations) (download)
Tue Jun 15 08:37:16 2004 UTC (20 years, 10 months ago) by wakaba
Branch: MAIN
CVS Tags: HEAD
File MIME type: text/plain
New

1 wakaba 1.1 INTERNET-DRAFT Scott Lawrence
2     draft-lawrence-digest-request-00.txt Agranat Systems, Inc.
3     Expires: December 1997 July 14, 1997
4    
5    
6     HTTP/1.1 Message Digest Attribute Request
7    
8     Status of this Memo
9    
10     This document is an Internet-Draft. Internet-Drafts are working
11     documents of the Internet Engineering Task Force (IETF), its
12     areas, and its working groups. Note that other groups may also
13     distribute working documents as Internet-Drafts.
14    
15     Internet-Drafts are draft documents valid for a maximum of six
16     months and may be updated, replaced, or obsoleted by other
17     documents at any time. It is inappropriate to use Internet-
18     Drafts as reference material or to cite them other than as
19     ``work in progress.''
20    
21     To learn the current status of any Internet-Draft, please check
22     the ``1id-abstracts.txt'' listing contained in the Internet-
23     Drafts Shadow Directories on ftp.is.co.za (Africa),
24     nic.nordu.net (Europe), munnari.oz.au (Pacific Rim),
25     ds.internic.net (US East Coast), or ftp.isi.edu (US West Coast).
26    
27     1. Abstract
28    
29     This memo describes a security weakness in the current Proposed
30     Standard for HTTP Digest Access Authentication, and proposes a
31     change to that scheme to correct the deficiency. The problem is
32     that there is no mechanism for either party to indicate a
33     requirement that messages be sent with an authentication digest.
34    
35    
36     draft-lawrence-digest-request-00.txt Page 2/4
37    
38     2. The Problem
39    
40     The Digest Authentication scheme specifies a mechanism (the
41     'digest' attribute of the Authentication-Info and Authorization
42     header fields) by which a digest of the message body and selected
43     headers may be transmitted. This provides a valuable means of
44     protecting the message body from modification or replay attacks
45     based on modifying either the message body or the protected
46     headers, while preserving the authentication headers.
47    
48     The mechanism is only valuable, however, if the message recipient
49     can require that the digest attribute is present, but at present
50     the authentication scheme does not provide a means to indicate that
51     the digest is required. There are two difficulties created by this
52     lack, an interoperability problem and a security problem:
53    
54     - The interoperability problem is that if one party (either client
55     or server) wishes to require a digest for a particular HTTP
56     request or response, the other party cannot be told of the
57     requirement. This leaves us with the situation that in order for
58     such a requirement to work that all messages using the Digest
59     Authentication scheme would need to use the message digest, even
60     those for which it would not be required. Because computing the
61     digest is relatively expensive, this is undesirable.
62    
63     - The security problem is that an attacker can remove the
64     attribute, preserving the remainder of the authentication
65     information, and modify the parts of the message the digest was
66     meant to protect.
67    
68     For example, a server implementation might provide for a resource
69     attribute to require that Digest Authentication be used and a
70     message digest supplied in order to submit a form. This would be
71     used to ensure that forms could be defined for which the flimsy
72     protections of Basic authentication are not appropriate. The
73     requirement that the Digest Authentication scheme be used can be
74     communicated to the client by sending a WWW-Authenticate header
75     with 'digest' as the only acceptable scheme, but no mechanism is
76     provided to require the message digest.
77    
78    
79     draft-lawrence-digest-request-00.txt Page 3/4
80    
81     3. Solution
82    
83     Attributes should be added to the WWW-Authenticate and
84     Authorization headers to indicate that a message digest is required
85     on the subsequent message. The section numbers below refer to [RFC
86     2069].
87    
88     Note that this draft does not propose that support for Digest
89     Access Authentication become a requirement for HTTP/1.1
90     conformance. It does add a requirement to the definition of the
91     scheme if it is supported at all.
92    
93     ================================================================
94     in section 2.1.1:
95    
96     WWW-Authenticate = "WWW-Authenticate" ":" "Digest"
97     digest-challenge
98    
99     digest-challenge = 1#( realm | [ domain ] | nonce |
100     [ opaque ] |[ stale ] | [ algorithm ] |
101     [ digest-required ] )
102     ...
103     digest-required = "digest-required"
104     ...
105    
106     digest-required
107     A flag, indicating that any request for the resource to which this
108     response applies must include the 'digest' attribute in its
109     Authorization header.
110    
111     ================================================================
112     in section 2.1.2:
113    
114     Authorization = "Authorization" ":" "Digest" digest-response
115    
116     digest-response = 1#( username | realm | nonce | digest-uri |
117     response | [ digest ] | [ algorithm ] |
118     opaque | digest-required )
119    
120     ...
121     digest-required = "digest-required"
122     ...
123    
124     digest-required
125     A flag, indicating that the response to this request must include
126     the 'digest' attribute in its Authentication-Info header.
127    
128     ================================================================
129    
130     in section 3.3, paragraph 4:
131    
132     The discussion of attacks based on removing the "digest" field of
133     the Authentication-Info header can be removed; the remainder is
134     still correct.
135    
136    
137     draft-lawrence-digest-request-00.txt Page 4/4
138    
139     4. Security Considerations
140    
141     This entire draft is about security considerations.
142    
143     5. Author's Addresses
144    
145     Scott Lawrence
146     Agranat Systems, Inc.
147     1345 Main St.
148     Waltham, MA 02154
149     Phone: +1-617-893-7868
150     Fax: +1-617-893-5740
151     Email: lawrence@agranat.com
152    
153     6. References
154    
155     [RFC 2068]
156     R. Fielding, J. Gettys, J. Mogul, H. Frystyk, and T. Berners-Lee.
157     "Hypertext Transfer Protocol -- HTTP/1.1."
158     RFC 2068,
159     U.C. Irvine, DEC, MIT/LCS,
160     January 1997.
161    
162     [RFC 2069]
163     J. Franks, P. Hallam-Baker, J. Hostetler, P. Leach,
164     A. Luotonen, E. Sink, and L. Stewart.
165     "An Extension to HTTP : Digest Access Authentication"
166     RFC 2069,
167     Northwestern University, CERN, Spyglass Inc., Microsoft Corp.,
168     Netscape Communications Corp., Spyglass Inc., Open Market Inc.,
169     January 1997.
170    
171    
172    
173    
174    

admin@suikawiki.org
ViewVC Help
Powered by ViewVC 1.1.24