[17629] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Feature or Flaw?

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Fri Jul 8 15:26:31 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Tue, 05 Jul 2005 17:26:46 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
Reply-To: herzbea@macs.biu.ac.il
To: Lance James <lancej@securescience.net>
Cc: cryptography@metzdowd.com
In-Reply-To: <42C866F3.60104@securescience.net>

Lance James wrote:
...
  > https://slam.securescience.com/threats/mixed.html
> 
> This site is set so that there is a frame of https://www.bankone.com 
> inside my https://slam.securescience.com/threats/mixed.html site. The 
> imaginative part is that you may have to reverse the rolls to understand 
> the impact of this (https://www.bankone.com with 
> https://slam.securescience.com frame -> done via cross-user attacks

Ok, I can do the `mental exercise` and understand the attack. But I'm 
not sure what is new here. Yes, if a web-site allows such XSS, then even 
SSL won't help it - it could end up sending the _wrong_ page, protected 
by SSL... And in this case I don't even think we can blame browser UI; 
the browser actually got this `bad` page from the server...

Maybe I miss something?

BTW, there is a new list focsed on such issues, at 
http://lists.cacert.org/cgi-bin/mailman/listinfo/anti-fraud
-- 
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com
Try TrustBar - improved browser security UI: 
http://AmirHerzberg.com/TrustBar
Visit my Hall Of Shame of Unprotected Login pages: 
http://AmirHerzberg.com/shame

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post