David McCabe wrote:

> Yes, it is off-topic, but I am replying anyway, because you are slightly wrong. :)
> 
> If the first connection to a web site causes the authentication to be activated, the
> password is _NOT_ encrypted. A successfull connection has to be established with a
> secure web site before the encryption is turned on. After the first connection, every
> other connection is then encrypted. The best way to ensure the password is encrypted
> is to have one unprotected page to go to, with links to the protected parts. Client
> connects to that page, encryption is on. Click on a link to a protected area,
> authentication goes on, but everything is now encrypted, including username/password
> given for authentication.

Do you have some documentation on that?  I say you are smoking crack.

I refer you to these:

[1] http://home.netscape.com/eng/ssl3/draft302.txt
[2] http://www.modssl.org/docs/2.5/ssl_intro.html#figure1

Specifically, from 1:

   The SSL Record Protocol is used for encapsulation
   of various higher level protocols.  One such encapsulated protocol,
   the SSL Handshake Protocol, allows the server and client to
   authenticate each other and to negotiate an encryption algorithm
   and cryptographic keys before the application protocol transmits or
   receives its first byte of data.

SSL traffic is encrypted before the first HTTP byte goes over the wire.

-jwb

Reply via email to