highly sensitive data, unless accompanied by <module>mod_ssl</module>.
Apache supports one other authentication method:
<code>AuthType Digest</code>. This method is implemented by <module
- >mod_auth_digest</module> and is much more secure. Most recent
- browsers support Digest authentication.</p>
+ >mod_auth_digest</module> and was intended to be more secure. This is no
+ longer the case and the connection should be encrypted with <module
+ >mod_ssl</module> instead.</p>
<p>The <directive module="core">AuthName</directive> directive sets
the <dfn>Realm</dfn> to be used in the authentication. The realm serves
<summary>
<p>This module implements HTTP Digest Authentication
(<a href="http://www.faqs.org/rfcs/rfc2617.html">RFC2617</a>), and
- provides a more secure alternative to <module>mod_auth_basic</module>.</p>
+ provides an alternative to <module>mod_auth_basic</module> where the
+ password is not transmitted as cleartext. However, this does
+ <strong>not</strong> lead to a significant security advantage over
+ basic authentication. On the other hand, the password storage on the
+ server is much less secure with digest authentication than with
+ basic authentication. Therefore, using basic auth and encrypting the
+ whole connection using <module>mod_ssl</module> is a much better
+ alternative.</p>
</summary>
<seealso><directive module="core">AuthName</directive></seealso>
</example>
<note><title>Note</title>
- <p>Digest authentication is more secure than Basic authentication,
- but only works with supporting browsers. As of this writing (December
- 2012) all major browsers support digest authentication.</p>
+ <p>Digest authentication was intended to be more secure than basic
+ authentication, but no longer fulfills that design goal. A
+ man-in-the-middle attacker can trivially force the browser to downgrade
+ to basic authentication. And even a passive eavesdropper can brute-force
+ the password using today's graphics hardware, because the hashing
+ algorithm used by digest authentication is too fast. Another problem is
+ that the storage of the passwords on the server is insecure. The contents
+ of a stolen htdigest file can be used directly for digest authentication.
+ Therefore using <module>mod_ssl</module> to encrypt the whole connection is
+ strongly recommended.</p>
</note>
</section>