WebApp Sec mailing list archives

Re: Growing Bad Practice with Login Forms


From: "Ian" <webappsec2 () fishnet co uk>
Date: Tue, 27 Jul 2004 15:12:46 +0100

On 27 Jul 2004 at 9:55, Mark Curphey wrote:

I am seeing more and more sites implementing a bad practice with login
forms.

To pick on a high profile site that should know better take ISACA as an
example.

http://www.isaca.org/

In the top left hand corner you will see their secure login button and a
graphical padlock embedded into the HTML. Of course if you look at the form
tags, this does indeed submit the form over SSL and in the process the SSL
handshake checks the certificate and my browser should verify that I am
indeed sending my password to isaca.org. 

But at that point its too late. The check for server authentication is done
after I have sent by username and password. This IMHO is a bad practice that
has started to creep into other sites including online banking. 

I have added the issue to the OWASP Pen Test CheckList.

Hi,

It was my understanding that the SSL session is initiated before any request is sent.  Therefore 
the username / password would be protected since any failure in the handshake would occur ( 
and be flagged by your browser ) before the data is sent.


Please correct me if I'm wrong because I may need to do some updates... ;)

Regards

Ian
-- 


Current thread: