28.02.2014 Views

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Basic Access Authentication<br />

The basic access authentication scheme is defined in the HTTP/1.0 specification (Fielding et al.,<br />

1996) and is, therefore, most widely supported by Web browsers and servers. Upon receipt of an<br />

unauthorized request for a protected resource, the server may send a 401 response with a challenge<br />

entry in the header fields like:<br />

WWW-Authenticate: Basic realm="Stock Database"<br />

where "Stock Database" the name of the protected space (the so called realm) on the server. In order<br />

to gain access, the client sends the username and password, separated by a single colon (":")<br />

character, within a base64 encoded string in the ''Authorization" header field. For example, the Web<br />

client uses the following header field to send the user-name "XXX" and the password "YYY":<br />

Authorization: Basic WFhYOllZWQo=<br />

If the user has supplied the correct user-name and password then the access to the document is given.<br />

Digest Access Authentication<br />

The digest access authentication scheme is mentioned in HTTP/1.1 (Fielding et al., 1996) and<br />

defined in Franks et al. (1997) as an alternative to the basic access authentication scheme. Basic<br />

access authentication suffers from the problem of passing the user's password unencrypted (base64<br />

encoded) across the network. This is an easy target for an attack. Using the digest access<br />

authentication scheme, the password is never sent across the network but instead, a hash value is<br />

sent. Upon receipt of an unauthorized request for a protected resource, the server constructs a nonce<br />

value, which is server-specified data string and should be uniquely generated each time a 401<br />

response is made. This nonce value is then sent within the a WWW-Authenticate header field to the<br />

Web client. The client constructs a digest in a predefined way (using MD5 (Rivest, 1992) per default)<br />

from the user-name, the password, the realm, the given nonce value, the HTTP method, and the<br />

request URI. The client resubmits the request including the digest in the "Authorization" header field.<br />

The server recalculates the digest based on the information it holds and makes an authentication and<br />

access decision based on whether it matches the user's digest. To prevent a replaying attack, the<br />

server may re-challenge the client with a new nonce at any time.<br />

Communication <strong>Security</strong> Service

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!