I would think it would be safer to block the site, or provide a
warning dialog.  (This is what I was expecting when I started reading
the head post; I was bit surprised at the interventionism to actually
go ahead and "fix" the site, maybe that would be a better default
behavior).


btw Regarding unadvertised SSL equivalents, I have noticed if you
login to gmail, you get SSL for login, but then http for web mailer.
However if you edit the URL after login to https, it appears to work
ok over SSL also.

Adam

On Mon, Sep 19, 2005 at 04:20:07PM -0700, John Gilmore wrote:
> Perhaps the idea of "automatically" redirecting people to alternative
> pages goes a bit too far:
> 
> > 1. TrustBar will automatically download from our own server,
> > periodically, a list of all of the unprotected login sites, including
> > any alternate protected login pages we are aware of. By default,
> > whenever a user accesses one of these unprotected pages, she will be
> > automatically redirected to the alternate, protected login page.
> 
> How convenient!  So if I could hack your server, I could get all
> TrustBar users' accesses -- to any predefined set of pages on the
> Internet -- to be redirected to scam pages.
> 
> A redirect to an "untrustworthy" page is just as easy as a redirect to a
> "trustworthy" page.  The question is who you trust.
> 
> > BTW, TrustBar is an open-source project, so if some of you want to
> > provide it to your customers, possibly customized (branded) etc., there
> > is no licensing required.
> 
> Also providing a handy platform for slightly modified versions, that will
> take their cues from a less "trustworthy" list of redirects.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to