lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Aug 10 02:34:21 2005
From: fd at ew.nsci.us (fd@...nsci.us)
Subject: Insecure http pages referencing https
	form-actions.

On Wed, 10 Aug 2005, Nick FitzGerald wrote:
> fd@...nsci.us wrote:
> > Today I realized that many "secured" web sites reference their secure 
> > login page from an insecure page.  For example:
> > 
> > http://www.some-luser.com/login.html:
> >   <form action="https://cgi.some-luser.com/login-cgi">
> >     user: <input name=user> 
> >     pass: <input name=pass>
> >   </form>
> 
> Welcome to, ohhh, 1997???
> 
> I can't be bothered looking it up, but this is ancient.
> 
> Of course, that it still happens really, often, on huge sites that 
> really should know better says a lot about, well, many things really...
> 
> 
> Regards,
> 
> Nick FitzGerald

Ok, good -- I'm not missing something then.  Almost a decade later and 
they still repeat history.  Guess its time to contact the vendor - wheee!

A note for those who use online banking: check for the s!

Thank you for your confirmation, Nick!

-Eric


-- 
Eric Wheeler
Vice President
National Security Concepts, Inc.
PO Box 3567
Tualatin, OR 97062

http://www.nsci.us/
Voice: (503) 293-7656
Fax:   (503) 885-0770

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ