[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Let's talk about HTTPS Everywhere



On the 19/01/2011 17:46, Camaleón wrote:
> On Wed, 19 Jan 2011 10:53:50 -0500, Curt Howland wrote:
> 
>> On Wednesday 19 January 2011, Camaleón was heard to
>> say:
> 
>>> Data stored in cookies is not what I understand for "sensitive". What
>>> kind of information do you think are cookies managing?
>>
>> Maybe this would be enlightening:
>>
>> http://codebutler.com/firesheep
>>
>> FTA:
>> "It's extremely common for websites to protect your password by
>> encrypting the initial login, but surprisingly uncommon for websites to
>> encrypt everything else. This leaves the cookie (and the user)
>> vulnerable. HTTP session hijacking (sometimes called "sidejacking") is
>> when an attacker gets a hold of a user's cookie, allowing them to do
>> anything the user can do on a particular website. On an open wireless
>> network, cookies are basically shouted through the air, making these
>> attacks extremely easy."
> 
> Maybe I have not expressed myself properly.
> 
> Any data passing through an unencrypted channel is vulnerable to be 
> fetched and reviewed by anyone and we all know that.
> 
> My point here is that I don't mind about _that kind of data_ to be 
> disclosed because is public and easily gathered by other means (anyone 
> reading my e-mail headers can see my IP address and/or e-mail client) and 
> tracking cookies (session cookies) do not contain sensible information 
> (by "sensible information" I mean passwords or username logins for 
> gaining access to online services, like banking, shopping or such).
> 
> In brief:
> 
> - Does the cookie contain sensitive/private information? → set/get the 
> cookie using ssl
> 
> - Does the cookie contain standard/publicly available information → no 
> need to be encrypted
> 
> What I fear, most than "unencrypted" browsing, is e-mail/ftp logins using 
> clear text passwords.
> 
> Greetings,
> 

It is not only the data enclosed inside the cookie which are at risk
here, but the entire session on the website you are logged in. Say you
log into your "friendface" account, and someone near your catch your
unencrypted session cookie, then he is YOU on YOUR "friendface" account...

Enjoy.


Reply to: