From: Ken Coar
Date: Tue, 8 Apr 1997 12:42:36 +0000 (+0000)
Subject: Enhance the FAQ with info about "I wanna use /etc/passwd for Web
X-Git-Tag: APACHE_1_2b9~75
X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=81eba82f7c160a26fadfb2edef4327814c16a1bb;p=apache
Enhance the FAQ with info about "I wanna use /etc/passwd for Web
authentication", and inadvertent POST restriction by omitting the
method from blocks. (Many thanks to Rob H and Marc S for
portions of the former.)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@77817 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/misc/FAQ.html b/docs/manual/misc/FAQ.html
index 0c553f7c6c..1dc18d064a 100644
--- a/docs/manual/misc/FAQ.html
+++ b/docs/manual/misc/FAQ.html
@@ -21,7 +21,6 @@
-
@@ -499,6 +504,80 @@
available in the way of solutions.
+
+ Why do I keep getting "access denied" for form POST
+ requests?
+
+
+ The most common cause of this is a <Limit> section
+ that only names the GET method. Look in your
+ configuration files for something that resembles the following and
+ would affect the location where the POST-handling script resides:
+
+
+ <Limit GET>
+ :
+
+
+ Change that to <Limit GET POST> and the problem
+ will probably go away.
+
+
+
+
+ Can I use my /etc/passwd file
+ for Web page authentication?
+
+
+ Yes, you can - but it's a very bad idea. Here are
+ some of the reasons:
+
+
+ - The Web technology provides no governors on how often or how
+ rapidly password (authentication failure) retries can be made. That
+ means that someone can hammer away at your system's
+ root password using the Web, using a dictionary or
+ similar mass attack, just as fast as the wire and your server can
+ handle the requests. Most operating systems these days include
+ attack detection (such as n failed passwords for the same
+ account within m seconds) and evasion (breaking the
+ connexion, disabling the account under attack, disabling
+ all logins from that source, et cetera), but the
+ Web does not.
+
+ - An account under attack isn't notified (unless the server is
+ heavily modified); there's no "You have 19483 login
+ failures" message when the legitimate owner logs in.
+
+ - Without an exhaustive and error-prone examination of the server
+ logs, you can't tell whether an account has been compromised.
+ Detecting that an attack has occurred, or is in progress, is fairly
+ obvious, though - if you look at the logs.
+
+ - Web authentication passwords (at least for Basic authentication)
+ generally fly across the wire, and through intermediate proxy
+ systems, in what amounts to plaintext. "O'er the net we
+ go/Caching all the way;/O what fun it is to surf/Giving my password
+ away!"
+
+ - Since HTTP is stateless, information about the authentication is
+ transmitted each and every time a request is made to the
+ server. Essentially, the client caches it after the first
+ successful access, and transmits it without asking for all
+ subsequent requests to the same server.
+
+ - It's relatively trivial for someone on your system to put up a
+ page that will steal the cached password from a client's cache. Can
+ you say "password grabber"?
+
+
+
+ If you still want to do this in light of the above disadvantages, the
+ method is left as an exercise for the reader. It'll void your Apache
+ warranty, though, and you'll lose all accumulated UNIX guru points.
+
+
+