Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-15 Thread Vlad \"SATtva\" Miller
coderman wrote on 14.09.2007 06:39: > On 9/13/07, scar <[EMAIL PROTECTED]> wrote: >> ... >> so, if we are using a website that uses HTTPS, but, in firefox, for >> example, in the cookies list under that website it shows "Send >> for: any type of connection", then the session is vulnerable? > > vul

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-13 Thread coderman
On 9/13/07, scar <[EMAIL PROTECTED]> wrote: > ... > so, if we are using a website that uses HTTPS, but, in firefox, for > example, in the cookies list under that website it shows "Send > for: any type of connection", then the session is vulnerable? vulnerable against a MITM that can request / inje

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-13 Thread scar
coderman @ 2007/09/10 18:16: > 0. Web sites may transmit authentication tokens unencrypted >http://www.kb.cert.org/vuls/id/466433 >... still no progress, with the companies in question dragging their > feet... > > 1. World's biggest websites no match for decade-old web bug > > http://ww

Re: a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-11 Thread Dave Page
On Mon, Sep 10, 2007 at 06:16:37PM -0700, coderman wrote: > the spreading popularity of wireless data networks may do more for > protecting Tor users against malicious exit nodes than any other > efforts in progress. perhaps big names pushing the HTTPS message will > help inform and protect users

a changing network security landscape is difficult for even the biggest tech companies to wrestle with

2007-09-10 Thread coderman
five weeks after presenting the dangers at BlackHat, Google, eBay, MySpace, Yahoo, Microsoft and a slew of others are still unable to resolve the problem. [0] the spreading popularity of wireless data networks may do more for protecting Tor users against malicious exit nodes than any other efforts