home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Internet
/
Collection of Internet.iso
/
infosrvr
/
dev
/
www_talk.930
/
000808_dsr@hplb.hpl.hp.com _Fri Apr 2 18:46:58 1993.msg
< prev
next >
Wrap
Internet Message Format
|
1994-01-24
|
3KB
Return-Path: <dsr@hplb.hpl.hp.com>
Received: from dxmint.cern.ch by nxoc01.cern.ch (NeXT-1.0 (From Sendmail 5.52)/NeXT-2.0)
id AA19990; Fri, 2 Apr 93 18:46:58 MET DST
Received: from hplb.hpl.hp.com by dxmint.cern.ch (5.65/DEC-Ultrix/4.3)
id AA18951; Fri, 2 Apr 1993 19:05:49 +0200
Received: from dragget.hpl.hp.com by hplb.hpl.hp.com; Fri, 2 Apr 93 18:00:10 +0100
Received: by manuel.hpl.hp.com
(16.6/15.6+ISC) id AA20689; Fri, 2 Apr 93 18:06:54 +0100
From: Dave_Raggett <dsr@hplb.hpl.hp.com>
Message-Id: <9304021706.AA20689@manuel.hpl.hp.com>
Subject: WWW access and ensuring confidentiality
To: www-talk@nxoc01.cern.ch
Date: Fri, 2 Apr 93 18:06:51 BST
Cc: sfk@hplb.hpl.hp.com
Mailer: Elm [revision: 66.36.1.1]
Here at Hewlett Packard, we need a way of preventing unauthorised
access to information, but want to take advantage of the WWW for
sharing information with colleagues.
Please give me your comments on our proposed solution.
I am working on a solution that makes use of UNIX's established
security mechanisms and making it easy for non-technical types
to manage things for themselves without the need to call out
the support staff.
Each web server can be run in two modes depending on a command line switch:
Mode 1
======
a) all world readable files are accessible
b) systems in the .rhosts file are treated appropriately
c) all other files require a user name & password
Mode 2
======
a) systems in the .rhosts file are treated appropriately
b) otherwise all files
The Authorisation: field in HTTP2 is used to carry the username
and password, e.g.
Authorisation: user fred:secret
Where "user" identifies the following as being username:password
which must refer to a valid user account on the host system. This
approach avoids the need for people to manage special configuration files.
We may also add a file similar to the .rhost file but specific to the web.
The browser keeps track of which system/protocol needs what user name/
password, and so only asks you once for each system per session. I am
also looking at using X11's interprocess communication facilities so
that multiple concurrent invokations of the browser can share the
same info to further minimise the pain.
The same approach is also used for our gateway from our closed subnet
to the rest of the world. This gateway relays tcp connections, but doesn't
accept requests to connect from the outside. I hence have to use ftp in
the passive mode.
In the future we will investigate more flexible approaches such as Kerberos
that avoid sending passwords in clear (unlike most UNIX apps such as ftp,
rlogin etc.).
Dave Raggett
Hewlett Packard Labs, Bristol, UK
+44 272 228046
dsr@hplb.hpl.hp.com