Re: Insecure WWW Access Authorization Protocol?

Sarr Blumson <sarr@citi.umich.edu>
Errors-To: listmaster@www0.cern.ch
Date: Tue, 8 Mar 1994 23:33:36 --100
Message-id: <9403082230.AA11829@dxmint.cern.ch>
Errors-To: listmaster@www0.cern.ch
Reply-To: sarr@citi.umich.edu
Originator: www-talk@info.cern.ch
Sender: www-talk@www0.cern.ch
Precedence: bulk
From: Sarr Blumson <sarr@citi.umich.edu>
To: Multiple recipients of list <www-talk@www0.cern.ch>
Subject: Re: Insecure WWW Access Authorization Protocol? 
X-Listprocessor-Version: 6.0c -- ListProcessor by Anastasios Kotsikonas
Content-Length: 1156

Tony Sanders says:
  michael shiplett writes:
  > "ts" == Tony Sanders <sanders@BSDI.COM> writes:
  >   The URL is as trustworth as the source of the URL--whether the
  > source is in or out of band.
  If you cannot trust the server reply to get the realm information from
  then why do you think you can trust the URL?  You have exactly the
  same problems as when you started.
  
I think we're munging two different things here.  Michael is willing to 
trust whoever gave him the URL pointing to, for example, 
citi.umich.edu, and believes that citi.umich.edu has what he wants.  
What he wants the security mechanisms to do for him is guarantee that 
the server he ends up talking to really _is_ citi.umich.edu, and not 
some imposter who has attacked the intervening cable.

I believe this is important because Michael is thinking about using 
forms to put confidential data into his server, so spoofing the server 
is more than just a denial of service.

--------
Sarr Blumson                         sarr@citi.umich.edu
voice: +1 313 764 0253               FAX: +1 313 763 4434
CITI, University of Michigan, 519 W William, Ann Arbor, MI 48103-4943