Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


View this topic in a long page with up to 500 replies per page Create new topic
1 | 2 
freitasm
BDFL - Memuneh
79250 posts

Uber Geek

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

#51260 6-Nov-2006 15:55
Send private message

Some fact checking please...

I contact Telecom New Zealand about this and got this reply:

The Telecom wireless hotspot log-in page is itself not secure, but as soon as someone enters  details and presses submit it is sent over a secure connection using SSL.

The SSL connection is really the primary precaution we take to protect the customer from things such as phishing scams.

SSL certificates are required to establish an SSL connection. These certificates are issued by Certificate Authorities or CAs, The CA, such as the well know VeriSign authority we use, take a lot of precautions to insure they only issue certificates to reputable organisations. So basically if the web site the user name and password are being submitted to (over a secure connection) has a valid certificate the user can be assured that the web site is the domain it claims to be and not some sort of  phishing scam site.


Telecom follows the same format for its  wireless hotspots as other international providers and is unaware of any such security issues to date.



I thought it was strange, so I walked to the usual Johnsonville Mall with baby and tried logging into the TNZ Hotspot service here. Although the login page itself is not encrypted, the POST page is:

[FORM name="WifiLoginForm" method="POST" action="https://auth.telecom.co.nz/live/wifi/wifilogin/WiFiLogin" onsubmit="return validate()"]

So, I think this settles the question of your login credentials being secure or not when you submit the data from a valid page. It is secure.

Still there's the problem of someone setting up a rogue Telecom New Zealand Hotspot just to collect credentials. This should be easily prevented if an encrypted page options was available.









Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSyncBackblaze backup




lapimate
352 posts

Ultimate Geek

Trusted
Lifetime subscriber

  #51285 6-Nov-2006 17:17
Send private message

freitasm: ...
All this for the peace of mind of knowing that people using their Xtra login on a Telecom Hotspot wouldn't have to worry about someone reading their e-mails ...


For pop3 access Xtra do have the extra-cost "Secure Remote E-mail" (SSL) service. 

freitasm
BDFL - Memuneh
79250 posts

Uber Geek

Administrator
ID Verified
Trusted
Geekzone
Lifetime subscriber

#51295 6-Nov-2006 17:51
Send private message

But not related to access to the Telecom Hotspot and how their authentication works.





Please support Geekzone by subscribing, or using one of our referral links: Samsung | AliExpress | Wise | Sharesies | Hatch | GoodSyncBackblaze backup




richms
28168 posts

Uber Geek

Trusted
Lifetime subscriber

  #51388 7-Nov-2006 01:34
Send private message

freitasm:So, I think this settles the question of your login credentials being secure or not when you submit the data from a valid page. It is secure.


Still there's the problem of someone setting up a rogue Telecom New Zealand Hotspot just to collect credentials. This should be easily prevented if an encrypted page options was available.



Which is the much more likly scenario then someone simply sniffing the login page.


It is bad practise to have a form on an insecure page, because unless the person looks at the page source every time for where the form is submitting to, and for rogue javascripts that are going to change it, then they have no way to know that the login will be secure. People have been told so often to look for a padlock etc that sites actually put images of them on pages so that people feel trust. I remember an experiment some time ago which ended up that people trust a padlock on the page more then they do one in the browers toolbar which was the reason firefox went to making the whole addressbar yellow. an http page being delivered for logging in doesnt inspire that trust, and rightly so.

http://www.hackaday.com/2006/10/30/dan-kaminskys-ssl-hell/ has a geeky guy talking about it at a security conference.

[Moderator edit (bradstewart): Hyperlinked]




Richard rich.ms

1 | 2 
View this topic in a long page with up to 500 replies per page Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.