From: Stefan Fritsch
Date: Mon, 30 Dec 2013 16:49:31 +0000 (+0000)
Subject: digest auth is only marginally more secure than basic auth.
X-Git-Tag: 2.5.0-alpha~4706
X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=7c241cef4f0b618063a3171324505960618ea713;p=apache
digest auth is only marginally more secure than basic auth.
Adjust the docs to today's reality.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1554276 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_auth_digest.xml b/docs/manual/mod/mod_auth_digest.xml
index df87588eba..0f58d63925 100644
--- a/docs/manual/mod/mod_auth_digest.xml
+++ b/docs/manual/mod/mod_auth_digest.xml
@@ -32,7 +32,11 @@
This module implements HTTP Digest Authentication
(RFC2617), and
- provides a more secure alternative to mod_auth_basic.
+ provides an alternative to mod_auth_basic where the
+ password is not transmitted as cleartext. However, the security
+ improvement over basic authentication is very small. Encrypting the
+ whole connection using mod_ssl is a much better
+ alternative.
AuthName
@@ -70,9 +74,14 @@
Note
- Digest authentication is more secure than Basic authentication,
- but only works with supporting browsers. As of this writing (December
- 2012) all major browsers support digest authentication.
+ Digest authentication was intended to be more secure than basic
+ authentication, but no longer fulfills that design goal. A
+ man-in-the-middle attacker can trivially force the browser to downgrade
+ to basic authentication. And even a passive eavesdropper can brute-force
+ the password using today's graphics hardware, because the hashing
+ algorithm used by digest authentication is too fast. Therefore
+ using mod_ssl to encrypt the whole connection is
+ recommended.
mod_auth_digest only works properly on platforms
where APR supports shared memory.