[3140] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Bloomingdales security?

daemon@ATHENA.MIT.EDU (David W. Morris)
Fri Oct 4 16:02:41 1996

Date: Fri, 4 Oct 1996 10:25:09 -0700 (PDT)
From: "David W. Morris" <dwm@xpasc.com>
To: "Anthony R. Plastino III" <tony.plastino@CyberSAFE.COM>
cc: www-security@ns2.rutgers.edu
In-Reply-To: <2.2.32.19961003152947.00a7d260@pop-srvr>
Errors-To: owner-www-security@ns2.rutgers.edu



On Thu, 3 Oct 1996, Anthony R. Plastino III wrote:

> >Well I checked and how does this look:
> ><FORM METHOD=POST ACTION="/scripts/order.exe">
> 
> 
> even if this post action was able to encrypt the number, you are sending it
> in the clear to the executable on the server anyway, so where is the
> security?  The object of securing http is to encrypt all transactions
> between host/client.  They should really fix their page.
> 
> 
> 
> 
> Anthony R. Plastino III - Systems Administrator
> CyberSafe Corporation   - tony.plastino@CyberSafe.COM
> 1605 NW Sammamish Rd.   - http://www.cybersafe.com
> Issaquah, WA  98027     -
> =====================================================
> Mine are _not_ the opinions of my employer.
       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

I also hope they don't pay for your knowledge about how security works 
with HTTPS ans SHTTP. As someone else has already noted, if the
form action had been, https:// ... the data transfer would have been
encrypted. Which was why I originally pointed out that we needed to
know the actual FORM action URL to know if bloomingdales was lying.

They were.

home help back first fref pref prev next nref lref last post