The IE Patch (MS04-004) demystified
Many people have asked what the scoop is on the recent IE update- and why did Microsoft disable passwords over HTTP? First, the change only affects URLs of the type:
Now, one thing many people are not aware of, is this format is not a supported URL format, as per the RFC 1738:
3.3. HTTP
The HTTP URL scheme is used to designate Internet resources
accessible using HTTP (HyperText Transfer Protocol).The HTTP protocol is specified elsewhere. This specification only
describes the syntax of HTTP URLs.An HTTP URL takes the form:
https://<host>:<port>/<path>?<searchpart>
In fact, in my very first book, “Designing Secure Web-Based Applications for Microsoft Windows 2000“ I made a comment about the username:pwd format:
Please also note that this method has been tested in Internet Explorer 5 and Netscape Navigator 4.7, but that there's no guarantee it will work in any other browser.
Next, the change in MS04-004, does not affect people building apps that embed an identifier in the querystring. And finally, it does not affect the FTP case, where username:pwd is totally valid.
You should also read the KB article about this, as it includes a registry key if you wish to enable the username:pwd format for HTTP.
Comments
Anonymous
February 04, 2004
Michael has written a post demystifying what went into the latest IE patch. He also pointed out Microsoft's on the subject, with a registry setting to renable this "feature". Interesting to note that in his first book entitled "Designing Secure Web-Based Applications for Microsoft Windows 2000", he even talked about the fact that developers should not rely on this functionality. Guess those scambling to deal with a work around to the fix should have listened more closely. More interesting is the fact he points to the exact reference in which the RFC specs do NOT support this hacked format... which means Microsoft was right in removing it. (Although they should never have had it in there to begin with... but thats another story)...Anonymous
February 04, 2004
It's been discussed on http://simon.incutio.com/archive/2004/01/30/noMoreUsernames
Basically a more RFC superseeds the RFC you mention, and defines this url format...Anonymous
February 04, 2004
a more [recent] RFC ...
sorryAnonymous
February 04, 2004
After applying the patch..My .NET application refuses to launch Microsoft Word...do you know if this relates to the patch?
ClassFactory Cannot Supply Requested Class ! !
I know it was working because I was working on the project while I downloaded the patch..
Rebooted, bam, ran the app and this error pops up..whats up with thatAnonymous
February 04, 2004
The Code in question is this:
wapp = new Microsoft.Office.Interop.Word.ApplicationClass();Anonymous
February 04, 2004
RFC 2396 is a little vague, it has the following text: Some URL schemes use the format "user:password" in the userinfo field. This practice is NOT RECOMMENDED, because the passing of authentication information in clear text (such as URI) has proven to be a security risk in almost every case where it has been used.
Note, the words, "Some URL schemes"Anonymous
February 04, 2004
Just a Developer:
For a start, you should not use "ApplicationClass" - just use "Application". (Yes, I know it's an interface, but you can 'new' it because the CLR is smart... IntelliSence is less so...)Anonymous
February 04, 2004
Also make sure you are using a PIA and not a private assembly - the "Strong Name" property of the reference in VS should be true. on and only Office XP and 2003 are officially supported with managed code.
For the record, I (obviously) have the patch installed and have no trouble creating Word through C#
using Word=Microsoft.Office.Interop.Word;
// -----
Word.Application app;
app = new Word.Application();
app.Visible = true;Anonymous
February 04, 2004
The comment has been removedAnonymous
February 05, 2004
The comment has been removedAnonymous
February 07, 2004
Since my original entry pointing to Michaels post about "The IE Patch (MS04-004) demystified" I have seen a lot of ridiculous and ludicrous comments in the midst of some great insight. I am only thankful that none of those idiots seem to visit my blog, as I am not sure I would appreciate such dim-witted statements here. Yes, Im venting. Mostly because in the midst of Microsoft doing something right as it relates to security, people complain. It wasnt even a month ago that these same people complained about the IE vulnerabilities... only to find something else to complain about after the recent IE patches. Yesterday on one private mailing list I am on I actually heard people discuss "class action" lawsuits against Microsoft for "loss of profits". Idiots. The moderator of that list sure got a piece of my mind on that one....Anonymous
February 08, 2004
Michael, RFC 1738 has been marked obsolete by the W3 Consortium. RFC 2396 is considered to be the replacement for RFC 1738 as stated in RFC 2396.
"This document defines the generic syntax of URI, including both absolute and relative forms, and guidelines for their use; it revises and replaces
the generic definitions in RFC 1738 and RFC 1808."Anonymous
February 08, 2004
The comment has been removedAnonymous
February 11, 2004
Ok, the old the syntax wasn't really official, and the patch corrects a possible security problem.
I understand all that.
What I'd like now is the Registry setting I need to add to DISABLE that functionnality. At the beginning of the discussion that was mentionned something of the sort would exist... Considering I understand the "risks" that would pose, I'd really like to be able to keep the possibility to access the sites directly from the shortcuts I have on my Desktop.Anonymous
March 01, 2004
Answering my question (for the record).
MS has updated the info:
To disable the new default behavior in Windows Explorer and Internet Explorer, create iexplore.exe and explorer.exe DWORD values in one of the following registry keys and set their value data to 0.
* For all users of the program, set the value in the following registry key:
HKEY_LOCAL_MACHINESoftwareMicrosoftInternet ExplorerMainFeatureControlFEATURE_HTTP_USERNAME_PASSWORD_DISABLE
* For the current user of the program only, set the value in the following registry key:
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMainFeatureControlFEATURE_HTTP_USERNAME_PASSWORD_DISABLEAnonymous
April 20, 2004
The comment has been removedAnonymous
April 20, 2004
that seems ok to me!! what threat worries you?Anonymous
June 18, 2004
lalaAnonymous
August 01, 2004
Believe you, support you, I believe that you are right! ! ! I will make great efforts to look like your study! ! !Anonymous
August 01, 2004
Believe you, support you, I believe that you are right! ! ! I will make great efforts to look like your study! ! !Anonymous
August 01, 2004
good!!Anonymous
August 04, 2004
rewrtAnonymous
August 06, 2004
quero senha pra entrar nesse site, tem como me arranjar???? pleaseAnonymous
May 29, 2009
PingBack from http://paidsurveyshub.info/story.php?title=michael-howard-s-web-log-the-ie-patch-ms04-004-demystifiedAnonymous
June 08, 2009
PingBack from http://jointpainreliefs.info/story.php?id=1367