"Perry E. Metzger" <[EMAIL PROTECTED]> writes:
>"Steven M. Bellovin" <[EMAIL PROTECTED]> writes:
>>>They're still doing the wrong thing. Unless the page was transmitted
>>>to you securely, you have no way to trust that your username and
>>>password are going to them and not to someone who cleverly sent you an
>>>altered version of the page.
>> They're doing the wrong thing, and probably feel they have no choice.
>> Setting up an SSL session is expensive; most people who go to their
.> home page do not log in, and hence do not (to Amex) require
>> cryptographic protection.
>That's why Citibank and most well run bank sites have you click on a button
>on the front page to go to the login screen. There are ways to handle this

I was just going to mention this myself because I've noticed local banks doing
it, you click on some "log in for online banking" link and get to an HTTPS
login page that's distinct from the HTTP main page.  For Mozilla/Firefox
users, grab a copy of the TargetAlert extension and you'll see this on the
originating page, TargetAlert will tag the login link with the "opens in new
window" indicator and the "HTTPS" indicator (the usual yellow padlock).  When
you've got TargetAlert installed, go to e.g. http://www.asbbank.co.nz/ to see


The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]

Reply via email to