HTTP Authentifizierung



Similar documents
HTTP Authentication. RFC 2617 obsoletes RFC 2069

No. Time Source Destination Protocol Info HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet

Anatomy of a Pass-Back-Attack: Intercepting Authentication Credentials Stored in Multifunction Printers

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013

Hypertext for Hyper Techs

Information Extraction Art of Testing Network Peripheral Devices

GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

HTTP Caching & Cache-Busting for Content Publishers

Internet Technologies Internet Protocols and Services

The Hyper-Text Transfer Protocol (HTTP)

HTTP Protocol. Bartosz Walter

HTTP Response Splitting

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring Four parts

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

TCP/IP Networking An Example

Chapter 27 Hypertext Transfer Protocol

Introduction Les failles les plus courantes Les injections SQL. Failles Web. Maxime Arthaud. net7. Jeudi 03 avril 2014.

International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44

Arnaud Becart ip- label 11/9/11

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

ivoyeur: permission to parse

Data Communication I

People Data and the Web Forms and CGI CGI. Facilitating interactive web applications

World Wide Web. Before WWW

LBL Application Availability Infrastructure Unified Secure Reverse Proxy

CloudOYE CDN USER MANUAL

Network Technologies

Authenticate and authorize API with Apigility. by Enrico Zimuel Software Engineer Apigility and ZF2 Team

Exception inattendue. Workflow v connexion en tant qu'administrateur

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

HOST EUROPE CLOUD STORAGE REST API DEVELOPER REFERENCE

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

Web Services April 21st, 2009 with Hunter Pitelka

Application layer Web 2.0

Module 45 (More Web Hacking)

Architecture of So-ware Systems HTTP Protocol. Mar8n Rehák

An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Developing Secure Mobile Apps

Alteon Browser-Smart Load Balancing

Securing SharePoint Server with Windows Azure Multi- Factor Authentication

Cyber Security Workshop Ethical Web Hacking

Using SAML for Single Sign-On in the SOA Software Platform

Kerberos and Single Sign On with HTTP

Vodia PBX RESTful API (v2.0)

Transport Layer Security Protocols

Playing with Web Application Firewalls

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Lektion 2: Web als Graph / Web als System

APACHE HTTP SERVER 2.2.8

Research of Web Real-Time Communication Based on Web Socket

CONTENT of this CHAPTER

Web Application Security

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

Zeitgemäße Webserver-Konfiguration. Ein Serviervorschlag

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.

Playing with Web Application Firewalls

JASPERREPORTS SERVER WEB SERVICES GUIDE

Package httprequest. R topics documented: February 20, 2015

By Bardia, Patit, and Rozheh

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

INVESTIGATION OF DIGITAL CERTIFICATES Creation of self-signed certificate on Windows 8

All You Can Eat Realtime

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

The Web History (I) The Web History (II)

Configuring and Monitoring Bluecoat AntiVirus

Technical Communication 1201 Norphonic emergency rugged telephone on Alcatel-Lucent OmniPCX Enterprise

How to set up Outlook Anywhere on your home system

Windows XP Exchange Client Installation Instructions

Delivery Context in Internet Protocols. Larry Masinter Adobe Systems Incorporated

Ethical Hacking as a Professional Penetration Testing Technique

The Application Layer. CS158a Chris Pollett May 9, 2007.

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Security for mobile apps

Hack Yourself First. Troy troyhunt.com

Barracuda Networks Web Application Firewall

Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND

TUT5860 Troubleshooting and Optimizing NetIQ Access Manager

Security Testing is performed to reveal security flaws in the system in order to protect data and maintain functionality.

Dynamic Content. Dynamic Web Content: HTML Forms CGI Web Servers and HTTP

Professional Mailbox Software Setup Guide

SIP: Session Initiation Protocol. Copyright by Elliot Eichen. All rights reserved.

Messaging API. API Specification Document Messaging API. Functionality: Send SMS Messages.

Application Layer: HTTP and the Web. Srinidhi Varadarajan

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite

Internet infrastructure

Transcription:

HTTP Authentifizierung Valentin Lein Matr. Nr. 0526536 15.12.2010 Computer Technology /21

Inhalt HTTP Basic Authentication Alternative Authentifizierungsmöglichkeiten HTTP Hypertext Transfer Protocol Computer Technology Valentin Lein 2/21

HTTP Basic Authentication Internet Engineering Task Force (IETF): RFC 2617 HTTP Authentication: Basic and Digest Access Authentication Client muss sich beim Server Authentifizieren Nur Base64-Codierung -> Unsicher Computer Technology Valentin Lein 3/21

HTTP Basic Authentication - Ablauf Client 1: Request Server 2: 401 Unauthorized WWW-Authenticate: Basic 3: GET Authorization: Basic Base64-Message 5: 200 Ok Computer Technology Valentin Lein 4/21

Request Hypertext Transfer Protocol GET /skripten/feto/online2002/index.html HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Connection: keep-alive Referer: http:///skripten/feto/ Computer Technology Valentin Lein 5/21

Authentification Required Hypertext Transfer Protocol HTTP/1.1 401 Authorization Required Request Version: HTTP/1.1 Response Code: 401 Date: Mon, 13 Dec 2010 15:42:14 GMT Server: Apache WWW-Authenticate: Basic realm="feto" Content-Length: 519 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html; charset=iso-8859-1 Line-based text data: text/html Computer Technology Valentin Lein 6/21

Aufforderung des Users zur Authentifikation Computer Technology Valentin Lein 7/21

Authentifikation des Clients Hypertext Transfer Protocol GET /skripten/feto/online2002/index.html HTTP/1.1 Request Method: GET Request URI: /skripten/feto/online2002/index.html Request Version: HTTP/1.1 Host: User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; de; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: de-de,de;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http:///skripten/feto/ Authorization: Basic ZmV0bzpmZXRv Credentials: feto:feto Computer Technology Valentin Lein 8/21

Response OK Hypertext Transfer Protocol HTTP/1.1 200 OK Request Version: HTTP/1.1 Response Code: 200 Date: Mon, 13 Dec 2010 15:42:14 GMT Server: Apache Last-Modified: Mon, 07 Jun 2004 10:43:32 GMT ETag: "5542b9-421-3dc42f1c05d00" Accept-Ranges: bytes Content-Length: 1057 [Content length: 1057] Keep-Alive: timeout=15, max=99 Connection: Keep-Alive Content-Type: text/html Line-based text data: text/html Computer Technology Valentin Lein 9/21

Alternativen zu Basic Authentication HTTP+HTML Form-Based Authentication Digest Access Authentication NTLM (kurz für NT LAN Manager) Authentication Computer Technology Valentin Lein 10/21

HTTP+HTML Form-Based Authentication Client Server 1: Request 2: HTML Form:username?, password?, "login button 3: From data: username, password 5: Ok Computer Technology Valentin Lein 11/21

Digest Access Authentication Wie Basic Authentication im IETF: RFC 2617 Client muss beim Authentifizieren MD5 Verschlüsselung verwenden MD5 Message-Digest Algorithm 5 Computer Technology Valentin Lein 12/21

Bsp. aus RFC 2617 http://www.nowhere.org/dir/index.html Username: "Mufasa Password: "Circle Of Life Computer Technology Valentin Lein 13/21

Authentification Required HTTP/1.1 401 Unauthorized WWW-Authenticate: Digest realm="testrealm@host.com", qop="auth,auth-int, nonce="dcd98b7102dd2f0e8b11d0f600bfb0c093", opaque="5ccc069c403ebaf9f0171e9517f40e41 Content-Type: text/html Computer Technology Valentin Lein 14/21

Aufforderung des Users zur Authentifikation Mufasa Computer Technology Valentin Lein 15/21

Berechnung der Response 1. Der MD5 hash der Kombination: Username, Authentication realm und Password wird berechnet => HA1. 2. Der MD5 hash der Kombination: method und digest URI wird berechnet, hier "GET" und "/dir/index.html". => HA2. 3. Der MD5 hash des HA1, server nonce (nonce), request counter (nc), client nonce (cnonce), quality of protection code (qop) und HA2 wird berechnet =>"response" Computer Technology Valentin Lein 16/21

Authentifikation des Clients Authorization: Digest username="mufasa", realm="testrealm@host.com", nonce="dcd98b7102dd2f0e8b11d0f600bfb0c093", uri="/dir/index.html", qop=auth, nc=00000001, cnonce="0a4f113b", response="6629fae49393a05397450978507c4ef1", opaque="5ccc069c403ebaf9f0171e9517f40e41 Computer Technology Valentin Lein 17/21

Server response OK HTTP/1.0 200 OK Server: HTTPd/0.9 Date: Sun, 10 Apr 2005 20:27:03 GMT Content-Type: text/html Content-Length: 7984 Computer Technology Valentin Lein 18/21

NTLM (NT LAN Manager) Authentication Challenge-Response-Authentifizierung Ursprünglich proprietäres Protokoll von Microsoft seit 2007 veröffentlicht Computer Technology Valentin Lein 19/21

NTLM Authentication Client 1: GET Server 2: 401 Unauthorized WWW-Authenticate: NTLM 3: GET Authorization: NTLM base64-encoded username 4: 401 Unauthorized WWW-Authenticate: NTLM <base64-encoded type-2-message> Challenge 5: GET Authorization: NTLM <base64-encoded type-3-message> hashed Challenge 6: 200 Ok Computer Technology Valentin Lein 20/21

Thank you for your attention! Computer Technology Valentin Lein 21/21

Quellen: Basic und Digest Access Authentication http://tools.ietf.org/html/rfc2617 NTLM Authentication http://msdn.microsoft.com/en-us/library/cc236621 Computer Technology Valentin Lein 22/21