comparison xml/en/docs/http/ngx_http_auth_basic_module.xml @ 836:f563967a4f59

Auth basic: ${SHA} password scheme.
author Ruslan Ermilov <ru@nginx.com>
date Thu, 07 Feb 2013 16:59:59 +0400
parents 7d15bd7fc58d
children 9dab69f2b71d
comparison
equal deleted inserted replaced
835:e0263d44a59b 836:f563967a4f59
8 <!DOCTYPE module SYSTEM "../../../../dtd/module.dtd"> 8 <!DOCTYPE module SYSTEM "../../../../dtd/module.dtd">
9 9
10 <module name="Module ngx_http_auth_basic_module" 10 <module name="Module ngx_http_auth_basic_module"
11 link="/en/docs/http/ngx_http_auth_basic_module.html" 11 link="/en/docs/http/ngx_http_auth_basic_module.html"
12 lang="en" 12 lang="en"
13 rev="3"> 13 rev="4">
14 14
15 <section id="summary"> 15 <section id="summary">
16 16
17 <para> 17 <para>
18 The <literal>ngx_http_auth_basic_module</literal> module allows 18 The <literal>ngx_http_auth_basic_module</literal> module allows
105 specified by the 105 specified by the
106 “<literal>{</literal><value>scheme</value><literal>}</literal><value>data</value>” 106 “<literal>{</literal><value>scheme</value><literal>}</literal><value>data</value>”
107 syntax (1.0.3+) as described in 107 syntax (1.0.3+) as described in
108 <link url="http://tools.ietf.org/html/rfc2307#section-5.3">RFC 2307</link>; 108 <link url="http://tools.ietf.org/html/rfc2307#section-5.3">RFC 2307</link>;
109 currently implemented schemes include <literal>PLAIN</literal> (an example one, 109 currently implemented schemes include <literal>PLAIN</literal> (an example one,
110 should not be used) and <literal>SSHA</literal> (salted SHA-1 hashing, used 110 should not be used), <literal>SHA</literal> (1.3.13) (plain SHA-1
111 by some software packages, notably OpenLDAP and Dovecot). 111 hashing, should not be used) and <literal>SSHA</literal> (salted SHA-1 hashing,
112 used by some software packages, notably OpenLDAP and Dovecot).
113 <note>
114 Support for <literal>SHA</literal> scheme was added only to aid
115 in migration from other web servers.
116 It should not be used for new passwords since unsalted SHA-1 hashing
117 that it employs is vulnerable to
118 <link url="http://en.wikipedia.org/wiki/Rainbow_attack">rainbow table</link>
119 attacks.
120 </note>
112 </listitem> 121 </listitem>
113 122
114 </list> 123 </list>
115 </para> 124 </para>
116 125