Password hashing (non-SSL)

前端 未结 6 2495
迷失自我
迷失自我 2021-02-20 13:18

How is the password sent from browser to server in case of non-ssl transfer?

I want to use bcrypt to hash password+salt before sending.... but it seems there is no javas

6条回答
  •  别跟我提以往
    2021-02-20 13:45

    Truthfully, you can hash it on the front end, but it isn't going to solve your underlying problem. Since you are going to store the hash for later verification, all a hacker needs to know is what the hashed value is. Then the hacker can send the hashed value to you, and you're system will authenticate it as the correct value. You are essentially sending the password unencrypted to the system.

    To be effective at all, the transfer needs to be encrypted through SSL.

    Actually, the easy way to get around the hashing issue is to just play the man in the middle attack. Since it's not using SSL, the person using the browser has no way of knowing the HTML content is not from your server. An attacker can simply position his code in between the client and the server and place additional code in the HTML to key log the password. The posted information then goes to the attacker; he or she takes what is wanted (in this case the password), and then forwards the information along to your server. Neither you nor the attacker will know you are not communicating to each other.

    This the reason why you have to buy a certificate from a verifiable source. They are verifying that the server you are communicating with is who they say they are.

    Related: Poisoning the DNS

提交回复
热议问题