Content deleted Content added
m Reverted edit by 2804:D55:52DD:4F00:6D93:5014:FD3C:828B (talk) to last version by Naruyoko |
No edit summary Tags: Reverted blanking Visual edit Mobile edit Mobile web edit |
||
Line 1:
{{Short description|Method of negotiating credentials between web server and browser}}
<span lang="indonesia">manual</span>
:albyan
:anpark93
:
If the qop directive's value is "auth" or is unspecified, then HA2 is
Line 50 ⟶ 25:
response = MD5(HA1:nonce:nonceCount:cnonce:qop:HA2)
</syntaxhighlight>
:<syntaxhighlight lang="text">
response = MD5(HA1:nonce:HA2)
</syntaxhighlight>
The HTTP scheme was designed by [[Phillip Hallam-Baker]] at [[CERN]] in 1993 and does not incorporate subsequent improvements in authentication systems, such as the development of keyed-hash message authentication code ([[HMAC]]). Although the [[cryptography|cryptographic]] construction that is used is based on the MD5 hash function, [[collision attack]]s were in 2004 generally believed to not affect applications where the plaintext (i.e. password) is not known.<ref name="CryptoRes-2004">{{cite web
Line 134 ⟶ 99:
* Digest access authentication prevents the use of a strong password hash (such as [[bcrypt]]) when storing passwords (since either the password, or the digested username, realm and password must be recoverable)
Also, since the [[MD5|MD5 algorithm]] is not allowed in [[FIPS 140-2|FIPS]], HTTP Digest authentication will not work with FIPS-certified<ref name="FIPS approved functions" group="note">The following is a list of FIPS approved algorithms: {{cite web |url=http://csrc.nist.gov/publications/fips/fips140-2/fips1402annexa.pdf |title=Annex A: Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules |date=January 31, 2014 |publisher=National Institute of Standards and Technology}}</ref> crypto modules.
=== Alternative authentication protocols ===
|