Please note, this is a STATIC archive of website developer.mozilla.org from 03 Nov 2016, cach3.com does not collect or store any user information, there is no "phishing" involved.

Revision 651585 of Onveilige wachtwoorden

  • Revisie-identificator: Security/OnveiligeWachtwoorden
  • Revisietitel: Onveilige Wachtwoorden
  • Revisie-id: 651585
  • Gemaakt:
  • Auteur: kevinh._
  • Is huidige revisie? Nee
  • Reactie

Inhoud van revisie

Onveilige wachtwoorden MDN pagina
 
Het HTTPS-protocol is ontworpen om gebruikersgegevens te beschermen tegen afluisteren(breuk van vertrouwen) en van aanpassing(integriteitsbreuk) op het netwerk. Websites die omgaan met gebruikersgegevens zijn wordt aangeraden HTTPS te gebruiken voor het beschermen van gebruikers tegen hackers. Zonder HTTPS is het mogelijk om gebruikersgegevens te stelen (bijv. logingegevens). Dit werd gedemonstreerd door Firesheep.
 
Serving insecure login forms is especially dangerous because of the wide variety of attacks that can be used against them. Network eavesdroppers steal a user's credentials directly by sniffing the network, or modify the served page in transit to enable a plethora of attacks.
 
The security panel in the Firefox Web Console warns developers if they serve pages that request passwords, like login forms, over an insecure connection. There are several scenarios in which a web developer can fail to protect their user's login experience:
 
1. Serving the login form over HTTP. Even if the form action is an HTTPS URL, the user's login form is not protected because an attacker can modify the page received by the user (for example, attackers can insert a keylogging script that exfiltrates their password as they type it, or they can change the form destination to post the sensitive data to a server that they control). Here is a screenshot presenting the problem with the relevant warning messages displayed in the security tab of the web console:
 
Login Fields on an Insecure Page
 
2. Using an HTTP URL in the form action. In this case, any data the user enters is sent through the network in cleartext. The user's password is clearly visible to anyone sniffing the network from the time the password leaves the user's computer to the time it reaches your website's servers. Here is another screenshot presenting the html source of the form and the relevant warning message:
Login fields on a form with an https:// action
 
3. Serving the login form in an HTTP iframe (or an HTTPS frame that is embedded in an HTTP frame). Even if the topmost page is HTTPS, including the password field in an HTTP iframe is equivalent to including it in an HTTP page. Attackers can modify the page and steal the user's credentials.
Login fields on an https:// iframe
 
Sometimes websites require username and passwords, but don't actually store data that is very sensitive. For example, a news site may save which news articles a user wants to go back and read, but not save any other data about a user. Web developers of the news site may be less motivated to secure their site and their user credentials. Unfortunately, password reuse is a big problem [link?]. Users use the same password across multiple sites (news websites, social networks, email providers, banks). Hence, even if access to the username and password to your site doesn't seem like a huge risk to you, it is a great risk to users who have used the same username and password to login to their bank accounts. Attackers are getting smarter; they steal username/password pairs from one site, and then try reusing them on more lucrative sites.
 

Bron van revisie

<div id="magicdomid2">
 <span class="author-g-xb9r5a26crrtk8p5">Onveilige wachtwoorden MDN pagina</span></div>
<div id="magicdomid3">
 &nbsp;</div>
<div>
 Het <span class="author-g-xb9r5a26crrtk8p5"><a href="https://en.wikipedia.org/wiki/HTTP_Secure" title="https://en.wikipedia.org/wiki/HTTP_Secure">HTTPS</a></span>-protocol is ontworpen om gebruikersgegevens te beschermen tegen afluisteren(breuk van vertrouwen) en van aanpassing(integriteitsbreuk) op het netwerk. Websites die omgaan met gebruikersgegevens zijn wordt aangeraden HTTPS te gebruiken voor het beschermen van gebruikers tegen hackers. Zonder HTTPS is het mogelijk om gebruikersgegevens te stelen (bijv. logingegevens). Dit werd gedemonstreerd door <span class="author-g-xb9r5a26crrtk8p5"><a href="https://codebutler.com/firesheep/" title="https://codebutler.com/firesheep/">Firesheep</a>.</span></div>
<div id="magicdomid5">
 &nbsp;</div>
<div id="magicdomid8">
 <span class="author-g-xb9r5a26crrtk8p5">Serving insecure login forms is especially dangerous because of the wide variety of attacks that can be used against them. Network eavesdroppers steal a user's credentials directly by sniffing the network, or modify the served page in transit to enable a plethora of attacks.</span></div>
<div id="magicdomid9">
 &nbsp;</div>
<div id="magicdomid10">
 <span class="author-g-xb9r5a26crrtk8p5">The security panel in the Firefox Web Console warns developers if they serve pages that request passwords, like login forms, over an insecure connection. There are several scenarios in which a web developer can fail to protect their user</span><span class="author-g-nz122z8n36s7o58x0fxu">'</span><span class="author-g-xb9r5a26crrtk8p5">s login experience:</span></div>
<div id="magicdomid11">
 &nbsp;</div>
<div id="magicdomid12">
 <span class="author-g-xb9r5a26crrtk8p5">1. Serv</span><span class="author-g-nz122z8n36s7o58x0fxu">ing</span><span class="author-g-xb9r5a26crrtk8p5"> the login form over HTTP. Even if the form action is an HTTPS URL, the user's login form is not protected because an attacker can modify the page received by the user</span><span class="author-g-nz122z8n36s7o58x0fxu"> (</span><span class="author-g-xb9r5a26crrtk8p5">for example</span><span class="author-g-nz122z8n36s7o58x0fxu">, attackers can</span><span class="author-g-xb9r5a26crrtk8p5"> insert a keylogging script that exfiltrates their password as they type it</span><span class="author-g-nz122z8n36s7o58x0fxu">, or they can change the form destination to post the sensitive data to a server that they control). Here is a screenshot presenting the problem with the relevant warning messages displayed in the security tab of the web console:</span></div>
<div>
 &nbsp;</div>
<div>
 <img alt="Login Fields on an Insecure Page" src="https://mdn.mozillademos.org/files/5951/insecure_page2_with_arrows_cropped.jpeg" style="width: 1072px; height: 517px;" /></div>
<div>
 &nbsp;</div>
<div id="magicdomid15">
 <span class="author-g-nz122z8n36s7o58x0fxu">2. Using an HTTP URL in the form action. In this case, any data the user enters is sent through the network in cleartext. The user's password is clearly visible to anyone sniffing the network from the time the password leaves the user's computer to the time it reaches your website's servers.</span> Here is another screenshot presenting the html source of the form and the relevant warning message:</div>
<div id="magicdomid16">
 <img alt="Login fields on a form with an https:// action" src="https://mdn.mozillademos.org/files/5947/insecure_form_action2_with_arrows_cropped.jpeg" style="width: 1072px; height: 468px;" /></div>
<div>
 &nbsp;</div>
<div id="magicdomid17">
 <span class="author-g-xb9r5a26crrtk8p5">3. </span><span class="author-g-nz122z8n36s7o58x0fxu">Serving the login form in an HTTP iframe (or an HTTPS frame that is embedded in an HTTP frame). Even if the topmost page is HTTPS, including the password field in an HTTP iframe is equivalent to including it in an HTTP page. Attackers can modify the page and steal the user's credentials.</span></div>
<div id="magicdomid20">
 <img alt="Login fields on an https:// iframe" src="https://mdn.mozillademos.org/files/5953/insecure_iframe3_with_arrows_cropped.jpeg" style="width: 1072px; height: 710px;" /></div>
<div>
 &nbsp;</div>
<div id="magicdomid21">
 <span class="author-g-nz122z8n36s7o58x0fxu">Sometimes websites require username and passwords, but don't actually store data that is very sensitive. For example, a news site may save which news articles a user wants to go back and read, but not save any other data about a user. Web developers of the news site may be less motivated to secure their site and their user credentials. Unfortunately, password reuse is a big problem [link?]. Users use the same password across multiple sites (news websites, social networks, email providers, banks). Hence, even if access to the username and password to your site doesn't seem like a huge risk to you, it is a great risk to users who have used the same username and password to login to their bank accounts. Attackers are getting smarter; they steal username/password pairs from one site, and then try reusing them on more lucrative sites.</span></div>
<div id="magicdomid22">
 &nbsp;</div>
Deze revisie terugzetten