摘要身份验证如何防止重放攻击?
我在 stackoverflow 上发现了很多问题,其中提到了摘要身份验证。我找不到摘要身份验证如何防止重放攻击?我使用 fiddler 工具拦截对服务器的 http 请求。我使用相同的工具向服务器重放请求,但服务器要求进行身份验证。
我需要准确了解如何实现防止重放攻击。服务器如何能够检测到任何 http 请求的重放?
任何链接/资源将不胜感激。
I found many questions on stackoverflow which has a mention about digest authentication. I could not find on how does the digest authentication prevent replay attacks? I use the fiddler tool to intercept the http request to the servers. I used the same tool for replaying the requests to the server but the server asked for authentication.
I need to understand exactly on how prevention of replay attack is achieved. How the server is able to detect any replay of http requests?
Any links/resources would be appreciated.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(1)
摘要式身份验证通过使用服务器指定的nonce来防止重放攻击。当客户端尝试发出未经身份验证的请求时,服务器会生成随机数,客户端必须将该随机数合并到其响应中。由服务器来管理有效的随机数,并在使用它们时使它们无效,以防止重播。
Digest authentication prevents replay attacks by using a server-specified nonce. The server generates a random nonce when the client attempts to make an unauthenticated request, client has to incorporate the nonce into its response. It's up to the server to manage valid nonces, and invalidate them when they've been used, to prevent replays.