27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

7.3 Basic Authenticati<strong>on</strong><br />

The basic authenticati<strong>on</strong> technology uses the <strong>Web</strong> server c<strong>on</strong>tent’s directory structure. Typically, all files<br />

in the same directory are c<strong>on</strong>figured with the same access privileges. A requesting user provides a<br />

recognized user identificati<strong>on</strong> and password for access to files in a given directory. More restrictive<br />

access c<strong>on</strong>trol can be enforced at the level of a single file within a directory if the <strong>Web</strong> server software<br />

provides this capability. Each vendor’s <strong>Web</strong> server software has its own method and syntax for defining<br />

and using this basic authenticati<strong>on</strong> mechanism.<br />

From a security perspective, the main drawback of this technology is that all password informati<strong>on</strong> is<br />

transferred in an encoded, rather than an encrypted, form. Any<strong>on</strong>e who knows the standardized encoding<br />

scheme can decode the password after capturing it with a network sniffer. Furthermore, any <strong>Web</strong> c<strong>on</strong>tent<br />

is transmitted as unencrypted plaintext, so this c<strong>on</strong>tent also can be captured, violating c<strong>on</strong>fidentiality.<br />

These limitati<strong>on</strong>s can be overcome using basic authenticati<strong>on</strong> in c<strong>on</strong>juncti<strong>on</strong> with SSL/TLS (see Secti<strong>on</strong><br />

7.5). Basic authenticati<strong>on</strong> is supported by standard-compliant <strong>Web</strong> browsers [Koss00]. Basic<br />

authenticati<strong>on</strong> is useful for protecting informati<strong>on</strong> from malicious bots (see Secti<strong>on</strong> 5.2.4) because the<br />

bots should not have the necessary credentials to access the protected directories. However, this<br />

mechanism should not be c<strong>on</strong>sidered secure against more determined and sophisticated attackers.<br />

7.4 Digest Authenticati<strong>on</strong><br />

Because of the drawbacks with basic authenticati<strong>on</strong>, an improved technique known as digest<br />

authenticati<strong>on</strong> was introduced in versi<strong>on</strong> 1.1 of the HTTP protocol. 47 Digest authenticati<strong>on</strong> uses a<br />

challenge-resp<strong>on</strong>se mechanism for user authenticati<strong>on</strong>. Under this approach, a n<strong>on</strong>ce or arbitrary value is<br />

sent to the user, who is prompted for an ID and password, as with basic authenticati<strong>on</strong>. However, in this<br />

case, the informati<strong>on</strong> entered by the user is c<strong>on</strong>catenated and a cryptographic hash of the result is formed.<br />

This hash is c<strong>on</strong>catenated with the n<strong>on</strong>ce and a hash of the requested method and URL, and the result is<br />

then rehashed as a resp<strong>on</strong>se value that is sent to the server.<br />

Because the user’s password is not sent in the clear, it cannot be directly sniffed from the network. The<br />

user’s password is not needed by the server to authenticate the user—<strong>on</strong>ly the hashed value of the user ID<br />

and password. Because the n<strong>on</strong>ce can serve as an indicator of timeliness (e.g., it can be composed of date<br />

and time informati<strong>on</strong>), replay attacks are also thwarted. Unfortunately, all other informati<strong>on</strong> is sent in the<br />

clear and is vulnerable to intercepti<strong>on</strong> and alterati<strong>on</strong>. Digest authenticati<strong>on</strong> is also susceptible to offline<br />

dicti<strong>on</strong>ary attacks (see Secti<strong>on</strong> 7.6) where the attacker tries various passwords in an attempt to recreate<br />

the captured digest value. These limitati<strong>on</strong>s can be overcome using digest authenticati<strong>on</strong> in c<strong>on</strong>juncti<strong>on</strong><br />

with SSL/TLS (see Secti<strong>on</strong> 7.5). 48 Like basic authenticati<strong>on</strong>, digest authenticati<strong>on</strong> is useful for protecting<br />

informati<strong>on</strong> from malicious bots (see Secti<strong>on</strong> 5.2.4).<br />

47<br />

48<br />

More informati<strong>on</strong> <strong>on</strong> basic and digest authenticati<strong>on</strong> is available from IETF RFC 2617, HTTP Authenticati<strong>on</strong>: Basic and<br />

Digest Access Authenticati<strong>on</strong> (http://www.ietf.org/rfc/rfc2617.txt).<br />

For example, offline dicti<strong>on</strong>ary attacks can be performed against intercepted digest authenticati<strong>on</strong> passwords to identify the<br />

cleartext passwords. Intercepted digest authenticati<strong>on</strong> passwords that are sent over SSL-protected c<strong>on</strong>necti<strong>on</strong>s are not<br />

susceptible to offline dicti<strong>on</strong>ary attacks.<br />

7-2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!