<?xml version="1.0"?>
<rss version="2.0">
	<channel>
		<title>Firesheep</title>
		<link>http://www.allegro.cc/forums/view/605376</link>
		<description>Allegro.cc Forum Thread</description>
		<webMaster>matthew@allegro.cc (Matthew Leverton)</webMaster>
		<lastBuildDate>Wed, 03 Nov 2010 19:10:58 +0000</lastBuildDate>
	</channel>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p>It&#39;s extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called &quot;sidejacking&quot;) is when an attacker gets a hold of a user&#39;s cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy.</p></div></div><p>
</p><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p>After installing the extension you&#39;ll see a new sidebar. Connect to any busy open wifi network and click the big &quot;Start Capturing&quot; button. Then wait.<br />As soon as anyone on the network visits an insecure website known to Firesheep, their name and photo will be displayed:<br />Double-click on someone, and you&#39;re instantly logged in as them.<br />That&#39;s it.<br />Firesheep is free, open source, and is available now for Mac OS X and Windows. Linux support is on the way.</p></div></div><p>

<a href="http://codebutler.com/firesheep">http://codebutler.com/firesheep</a></p><p>Unfortunately, my laptop runs Linux, so I can&#39;t try it out for myself yet...
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (gnolam)</author>
		<pubDate>Mon, 25 Oct 2010 16:14:10 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Interesting, indeed. I&#39;ll test it tonight ^^
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (GullRaDriel)</author>
		<pubDate>Mon, 25 Oct 2010 17:36:00 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I would hope that this is common knowledge by now...
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Mon, 25 Oct 2010 19:47:03 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>It&#39;s not new, no, but it&#39;s never been this user friendly.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (gnolam)</author>
		<pubDate>Mon, 25 Oct 2010 20:33:36 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I&#39;ve not used public WiFi for a while for this reason (not because of Firesheep but because of traffic sniffing), I use private 3G connections instead...
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Crazy Photon)</author>
		<pubDate>Mon, 25 Oct 2010 21:06:57 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I only use public wifi if I can proxy via a SSH tunnel to my home network.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Mon, 25 Oct 2010 21:09:58 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Nice. <img src="http://www.allegro.cc/forums/smileys/smiley.gif" alt=":)" /> I&#39;m willing to bet that a lot of Facebook and Twitter users will be coming out of the closet in the near future... <img src="http://www.allegro.cc/forums/smileys/lipsrsealed.gif" alt=":-X" /></p><p>That said, I&#39;d want to carefully glance over the code before running it. <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Mon, 25 Oct 2010 21:19:27 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I&#39;d try it, but I don&#39;t think WKU would like it if I sniffed around on their network.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Neil Black)</author>
		<pubDate>Mon, 25 Oct 2010 21:46:41 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887355#target">bamccaig</a> said:</div><div class="quote"><p> I&#39;m willing to bet that a lot of Facebook and Twitter users will be coming out of the closet in the near future...</p></div></div><p>What?  You mean we&#39;ll see a lot more of:</p><p>&lt;real owner posts something debatable here&gt;</p><p>&lt;haxx0r posts this&gt;<br />&quot;HAHAHA!  Disregard that, I sxxk cxxxs!&quot;?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Mon, 25 Oct 2010 22:03:01 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887365#target">Arthur Kalliokoski</a> said:</div><div class="quote"><p>
What?  You mean we&#39;ll see a lot more of...
</p></div></div><p>
That, but also a more blunt approach... I know that when in college there was at least one instance where a student had forgotten to log off before leaving a computer lab and another user sent the entire school (students, faculty, etc.) an E-mail from his account confessing to being homosexual (using mailing lists). It looked sincere until it was recanted a few hours later from the same account. <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" /> It was pretty hilarious for everyone (except for maybe the victim). <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" /> It was also a lesson to the entire school to not leave your computer logged in and unattended; and to remember to log out before leaving. <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" /></p><p>I have a colleague that always does that (actually, most probably do, but I notice because her screen faces the door <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" />) regularly at j0rb and I always have to fight the urge to change her home page to <tt>www.<i>companyname</i>sucks.com</tt><span class="ref"><sup>[<a href="#">1</a>]</sup></span>. <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" /></p><p><i>** APPEND **</i></p><p>Take a look at their list of affected sites:</p><p><a href="http://github.com/codebutler/firesheep/wiki/Handlers">http://github.com/codebutler/firesheep/wiki/Handlers</a></p><p><img src="http://www.allegro.cc/forums/smileys/shocked.gif" alt=":o" />
</p><div class="ref-block"><h2>References</h2><ol><li><a href="http://thedailywtf.com/Articles/Hacking_Made_Easy.aspx">http://thedailywtf.com/Articles/Hacking_Made_Easy.aspx</a></li></ol></div></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Mon, 25 Oct 2010 22:14:35 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Wha..? Where&#39;s A.cc on that list?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jeff Bernard)</author>
		<pubDate>Tue, 26 Oct 2010 10:47:57 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887367#target">bamccaig</a> said:</div><div class="quote"><p>Take a look at their list of affected sites:</p></div></div><p>
Every site that uses cookies without HTTPS will be affected, so the length of their list is only surprising in its sparseness.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Billybob)</author>
		<pubDate>Tue, 26 Oct 2010 10:56:35 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Not if you tie the session cookie to other information, such as the client&#39;s IP address. Unless both the attacker and the legit user are behind the same router, this should be pretty hard to spoof - but then the downside is that you will be logged out as soon as you&#39;re on a different network or your DHCP resets.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Tobias Dammers)</author>
		<pubDate>Tue, 26 Oct 2010 15:01:22 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887443#target">Tobias Dammers</a> said:</div><div class="quote"><p> Unless both the attacker and the legit user are behind the same router, this should be pretty hard to spoof </p></div></div><p>If you both are connected to the same unsecured WLAN (which is required for this exploit), you will very likely have the same external IP as well.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jonatan Hedborg)</author>
		<pubDate>Tue, 26 Oct 2010 15:10:05 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887444#target">Jonatan Hedborg</a> said:</div><div class="quote"><p>
If you both are connected to the same unsecured WLAN (which is required for this exploit), you will very likely have the same external IP as well.
</p></div></div><p>
Uhm, but then what&#39;s the problem? Logging into anything unsecured on any public network is like asking for problems.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Tobias Dammers)</author>
		<pubDate>Tue, 26 Oct 2010 15:20:34 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887445#target">Tobias Dammers</a> said:</div><div class="quote"><p> Uhm, but then what&#39;s the problem? Logging into anything unsecured on any public network is like asking for problems.</p></div></div><p>Exactly. This isn&#39;t a new exploit. It&#39;s just been made a LOT easier for people to use it.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jonatan Hedborg)</author>
		<pubDate>Tue, 26 Oct 2010 15:56:16 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>That&#39;s just what the OP said in his second post.</p><p>Brats.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (GullRaDriel)</author>
		<pubDate>Tue, 26 Oct 2010 16:09:17 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887433#target">Billybob</a> said:</div><div class="quote"><p>Every site that uses cookies without HTTPS will be affected, so the length of their list is only surprising in its sparseness.</p></div></div><p>
Well they&#39;re targeting the masses so they&#39;re specifically adding support for popular social networking sites and sales companies and financial companies and the like. Besides, it isn&#39;t really a big deal if somebody manages to hijack your Allegro.cc session. The amount of harm they can do is limited. They can post as you, edit your most recent posts, modify your profile or settings, but the worst that they can possibly do is get you banned by ML. <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" /> Well, they could also learn your real name if you entered it in A.cc and have been keeping it a secret. <img src="http://www.allegro.cc/forums/smileys/lipsrsealed.gif" alt=":-X" /> Most of the regulars have revealed their alleged names anyway.</p><p>It matters more on sites like Facebook and Twitter and <i>PayPal</i> where you have a lot of your information and a lot of your information is shared with others (some of which might even know you <img src="http://www.allegro.cc/forums/smileys/rolleyes.gif" alt="::)" />), as well as their information being shared with you. Access to somebody&#39;s Facebook account could easily open the door for social mayhem or even social engineering. Not to mention all of the personal information that the idiots of the world share with Facebook. It&#39;s a pretty serious thing for it to get hijacked. Albeit, it doesn&#39;t really matter because those same idiots have already installed &quot;applications&quot; that steal all of their information and sell it...</p><p>In any case, many sites just don&#39;t need that level of security because there isn&#39;t much to benefit from hijacking somebody&#39;s account (though you could still get a laugh out of it).
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Tue, 26 Oct 2010 19:11:46 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Well, <a href="http://www.iltasanomat.fi/uutiset/kotimaa/uutinen.asp?id=2268735&amp;ref=tf1">Firesheep broke the tabloid headline threshold in Finland.</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (jhuuskon)</author>
		<pubDate>Tue, 26 Oct 2010 19:28:47 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Seriously, isn&#39;t this &quot;exploit&quot; like 10 years old? O.o</p><p>What is the big deal?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jonatan Hedborg)</author>
		<pubDate>Tue, 26 Oct 2010 19:57:09 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887474#target">Jonatan Hedborg</a> said:</div><div class="quote"><p> What is the big deal?</p></div></div><p>That the average Joe will be able to perform the attack.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Crazy Photon)</author>
		<pubDate>Tue, 26 Oct 2010 20:01:03 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887476#target">Crazy Photon</a> said:</div><div class="quote"><p> That the average Joe will be able to perform the attack.
</p></div></div><p>The &quot;average Joe&quot; has no reason to do the attack, except to a) see if it works or perhaps b) goof with his &quot;friend&#39;s&quot; Facebook status.</p><p>The person who would actually do something bad with such a tool already knew how to do this, and probably already had his own tools that do the same thing.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Tue, 26 Oct 2010 20:08:25 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>^++
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jonatan Hedborg)</author>
		<pubDate>Tue, 26 Oct 2010 20:10:49 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Hehe -&gt; <a href="http://news.netcraft.com/archives/2010/10/26/firesheep-usage-leads-to-idiocy.html">Idiocy tool</a>.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Crazy Photon)</author>
		<pubDate>Tue, 26 Oct 2010 22:08:39 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>The significance of Firesheep isn&#39;t the danger of attack (which has always been there), but the potential awareness that users (and victims) can gain from it. While Idiocy does have the potential to be a little bit more educational for victims, it will probably be used less often because there isn&#39;t much in it for the attacker. Besides, many users will probably just think &quot;oh well, doesn&#39;t hurt me&quot; and go on with their day. Firesheep <i>can</i> hurt them and the &quot;attackers&quot; will probably install it with intent to do &quot;harm&quot;, even if it&#39;s childish harm. <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Tue, 26 Oct 2010 22:38:49 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887465#target">bamccaig</a> said:</div><div class="quote"><p> It matters more on sites like Facebook and Twitter and PayPal where you have a lot of your information</p></div></div><p>Wait... PayPal? It&#39;s impossible to do anything on there without HTTPS, just like most other financial sites who are even remotely intelligent.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (BAF)</author>
		<pubDate>Wed, 27 Oct 2010 07:21:44 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887565#target">BAF</a> said:</div><div class="quote"><p>
Wait... PayPal? It&#39;s impossible to do anything on there without HTTPS, just like most other financial sites who are even remotely intelligent.
</p></div></div><p>
That&#39;s what I had assumed... It&#39;s on their list though so maybe they know something we don&#39;t. It&#39;s possible that PayPal does non-financial/non-administrative operations over plain HTTP, but that seems risky and silly when you already have the security layer (obviously resources like images are fine over HTTP, but things like scripts and actually server-communication should be over HTTPS)... I think cookies would differ between HTTP and HTTPS sites (as the port would be different) so I don&#39;t think cookies would be shared between them. I could be wrong. PayPal is listed as one of the &quot;incomplete&quot; sites so maybe they&#39;re just calling out names. <img src="http://www.allegro.cc/forums/smileys/tongue.gif" alt=":P" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Wed, 27 Oct 2010 08:12:02 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>It&#39;s now hit the local free newspaper (&quot;Extra Östergötland&quot;) as well, with some wonderful sensationalism. <img src="http://www.allegro.cc/forums/smileys/smiley.gif" alt=":)" /></p><p>BTW, <a href="http://www.imperialviolet.org/2010/06/25/overclocking-ssl.html">HTTPS is not expensive anymore.</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (gnolam)</author>
		<pubDate>Wed, 27 Oct 2010 17:14:21 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Are cookies readable from any website?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (axilmar)</author>
		<pubDate>Wed, 27 Oct 2010 17:17:05 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Also front page of Stockholm Metro today. &quot;FIRESHEEP WILL STEAL YOUR FACEBOOK PASSWORDS!!!111&quot; (paraphrased).
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Jonatan Hedborg)</author>
		<pubDate>Wed, 27 Oct 2010 17:33:59 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Well, I always use the https firefox plug and one that disables/protects cookies where possible. </p><p>Surely the likes of facebook/twitter would be encrypting the cookies and storing the main details in a database, as well as doing the usual stuff like id regeneration?
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Neil Walker)</author>
		<pubDate>Wed, 27 Oct 2010 17:59:54 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>If browsers allow any cookies to be read from any site, then the spec is already broken - it&#39;s a design flaw.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (axilmar)</author>
		<pubDate>Wed, 27 Oct 2010 18:39:32 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887587#target">Neil Walker</a> said:</div><div class="quote"><p>
Surely the likes of facebook/twitter would be encrypting the cookies and storing the main details in a database, as well as doing the usual stuff like id regeneration?
</p></div></div><p>
Cookies are sent in the headers of your HTTP request with Facebook. It doesn&#39;t really matter if the cookie is &quot;encrypted&quot; or not if the connection itself isn&#39;t because the information in the cookie isn&#39;t actually interesting (usually). What is useful is that Facebook (and all Web sites) identify user sessions by the cookie, which means that if you have the cookie to send to Facebook then as far as Facebook knows you are on that user session and can do anything that user can do. I don&#39;t have a Facebook account, but IIRC most of the pages are not over HTTPS though. Probably just the login process. In other words, you can&#39;t encrypt just the cookie (you can, but it wouldn&#39;t do any good). You can either encrypt the entire connection or accept hijacking.
</p><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887592#target">axilmar</a> said:</div><div class="quote"><p>If browsers allow any cookies to be read from any site, then the spec is already broken - it&#39;s a design flaw.</p></div></div><p>
Cookies aren&#39;t so much &quot;read&quot; by Web sites as they are sent with HTTP requests in the headers. The beginning of every HTTP request has a header with the basic request information/protocol stuff followed by <tt>`name: value`</tt> lines. Cookies that match the host&#39;s domain or IP (however you are accessing the host) are sent with the request.</p><p>JavaScript, which runs client-side, can read cookies, but it only has access to cookies for its same domain. If the &lt;script&gt; tag is inline then it will be for the HTML document that it&#39;s embedded in. If the &lt;script&gt; tag is remote (i.e., <tt>src</tt> attribute) then I think that it applies to whatever host the script was fetched from. I haven&#39;t personally confirmed this though.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Wed, 27 Oct 2010 18:43:32 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>The only real stopping point for HTTPS is the IP cost of some hosts. Once we are in a position where the folk who don&#39;t use HTTPS because it would double their hosting bill for the IP address is when this won&#39;t be an issue any more.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (MiquelFire)</author>
		<pubDate>Wed, 27 Oct 2010 18:46:15 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887594#target">MiquelFire</a> said:</div><div class="quote"><p>
The only real stopping point for HTTPS is the IP cost of some hosts. Once we are in a position where the folk who don&#39;t use HTTPS because it would double their hosting bill for the IP address is when this won&#39;t be an issue any more.
</p></div></div><p>
An extra IP address with my (our) host is only $1/month... Then again, if you encrypt your entire site then you only need one (albeit, the bandwidth costs to encrypt images and the like would probably be more than the cost of an extra IP).
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Wed, 27 Oct 2010 18:50:12 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Also, HTTPS supposedly supports virtual hosting now. So you should be able to get a https/ssl key from your hosting provider that you can use without having to get a second IP.</p><p>Of course some <i>old</i> clients might not support that, but how many people here want to support browsers like IE6? <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 27 Oct 2010 18:58:41 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>According to info gathered from various sites, Firesheep uses the winpcap library to sniff packets coming through the wi-fi network. </p><p>Firesheep reads the cookies sent by the browser to the target site and then uses them for accessing the accounts of the target site.</p><p>This means that any account where cookies are used for authentication can be compromised.</p><p>According to the info, this is a well known attack method known as session hijacking. Firesheep&#39;s originality is that it&#39;s the first program to allow any user to do it with a click of a button.</p><p>The web will not be secure until everything is encrypted, including DNS requests (of course). But this is something that will never happen, not because of cost (after all, if something is so important, hardware can be made specifically for that; graphics accelerators, for example), but because the authorities will lose the capability to eavesdrop the general public.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (axilmar)</author>
		<pubDate>Wed, 27 Oct 2010 18:59:48 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>How much is the cost of the plan you&#39;re on?</p><p>Also, I know of a host that doesn&#39;t offer static IPs (and by extension HTTPS) because of the fact IPv4 is running out of room.</p><p>[edit]</p><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887597#target">Thomas Fjellstrom</a> said:</div><div class="quote"><p>Of course some old clients might not support that, but how many people here want to support browsers like IE6? <img src="http://www.allegro.cc/forums/smileys/grin.gif" alt=";D" /></p></div></div><p>

And Windows XP users running Chrome, Safari, IE7 and IE8
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (MiquelFire)</author>
		<pubDate>Wed, 27 Oct 2010 19:01:52 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p><a href="http://www.corenetworks.net/">http://www.corenetworks.net/</a></p><p>Seems the affordable private servers are sold out. <img src="http://www.allegro.cc/forums/smileys/sad.gif" alt=":(" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Wed, 27 Oct 2010 19:10:15 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887599#target">MiquelFire</a> said:</div><div class="quote"><p>How much is the cost of the plan you&#39;re on?</p></div></div><p>We have the $80/mo plan. With a ram upgrade.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 27 Oct 2010 19:24:42 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/887582#target">axilmar</a> said:</div><div class="quote"><p> Are cookies readable from any website?
</p></div></div><p>No. Cookies are always restricted by the top level domain. Optionally they can be restricted by path or sub-domain. You can also limit a cookie to only be set via SSL.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Matthew Leverton)</author>
		<pubDate>Wed, 27 Oct 2010 23:20:23 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>you could guard against this without having to ssl every page by:</p><p>A) Having the user only use a single tab and do ajax for all page requests, probably implement your own javascript window manager and task bar like a web app so they can still browse multiple pages at once within a page.</p><p>Share a secret in the SSL reply to successful login that sets this up, a secret key that is used as a seed to a psuedo random number generator which is submitted with each page requests (as a cookie or a GET variable or whatever). The server stays in sync with a session variable to check if it is valid or not.</p><p>Snooping attacker can read your details but cannot form a valid reply.</p><p>An issue here is that the browsers rand() and the servers are likely to be different, plus the server must cache the state of it in session variable. This means you will have to implement your own PRNG in both server-side scripting and javascript, which is easy and fast.</p><p>B) An improvement that would allow multiple browser tabs would be if you can set javascript cookies that do not get sent to the server that could be used as a point of synchronization between all pages, or even more effectively by embedding a flash object that uses flash cookies and the external-interface api to act as a local storage engine for the javascript.</p><p>You&#39;d still need to either have every link call a javascript function that blocks until it gets auth code and then modifies request and allows page to send and load, or instead prerequest one for each different link at page load and preset them to their own code, and the server tests if the code is within the next or previous 9,001 cycles of the PRNG for example, but will never accept the same code twice, to allow someone to not have to maybe wait at opening a new page and still open many links in new tabs for a new page even after its been sitting there for a few minutes (if all on same page used same preload value, only first would load a page the rest would be denied).</p><p>Each page has a javascript function and embedded flash object, javascript function onload disables all links replaced with a function that pops an alert saying &quot;please enable flash or wait for flash object to initialize!&quot; and then the flash object in frame 1 reads its flash cookie if it exists and then calls a JavaScript callback function to re-enable all linsk with future auth codes that it provides as an array argument.</p><p>The ssl login page would serve the initial seed value as a value of &lt;input hidden or a hard coded return value of js function, that the flash object within that page would call when it&#39;s ready and set the flash cookie and then use js api to forward this intermediate &quot;please wait&quot; page to the success homepage or user control page or something.</p><p>Bullet Proof.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (m c)</author>
		<pubDate>Fri, 29 Oct 2010 07:16:33 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Regarding ^ these lies, if unencrypted, anything you send between client and server is known to the attacker. That includes Flash communication. In theory, you can come up with your own PRNG that is the same between client and server, but you&#39;d have to ensure that both client and server have the same inputs (seeds), which is no easy task. More than likely, whatever algorithm you use would be discoverable by an attacker using the system or by analyzing traffic. And anyway for all intents and purposes it&#39;s just reinventing the square wheel. It&#39;s encryption. Instead of a secret key you have a secret algorithm. You might as well just rely on SSL, which is tried and tested, instead of relying on your homebrew attempt at security which is likely nowhere near as sophisticated as the standards trusted by the rest of the planet. <img src="http://www.allegro.cc/forums/smileys/wink.gif" alt=";)" /></p><p>All of that is before accepting that not all clients have JavaScript/Flash. <img src="http://www.allegro.cc/forums/smileys/rolleyes.gif" alt="::)" /> I <i>hate</i> sites that are crippled without them. So <span class="cuss"><span>fuck</span></span>ing annoying. <img src="http://www.allegro.cc/forums/smileys/angry.gif" alt="&gt;:(" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (bamccaig)</author>
		<pubDate>Fri, 29 Oct 2010 07:56:56 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title">Quote:</div><div class="quote"><p>Reports have been trickling in that Microsoft’s anti-virus software is now detecting Firesheep as a threat, despite the fact that Firesheep poses absolutely no threat to the integrity of the system it’s installed on, and as mentioned earlier, has many legitimate uses. By installing anti-virus, you grant a third party the ability to remove files from your system trusting that only malicious code will be targeted. Microsoft and other anti-virus vendors abuse this trust and assert what they think you should or should not be doing with your computer. This is dangerous, but unfortunately not unprecedented.</p></div></div><p>

<a href="http://codebutler.com/firesheep-a-week-later-ethics-and-legality?c=1">http://codebutler.com/firesheep-a-week-later-ethics-and-legality?c=1</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Wed, 03 Nov 2010 07:29:28 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>I thought this video from the minecraft thread was rather apt:</p><p><div class="media-player youtube"><div style="margin: 1em 2em; background: url(/images/movie.png); width: 180px; height: 100px; text-align: center;"><a href="http://www.allegro.cc//www.youtube.com/watch?v=JeV0XB-w_yM" target="_blank"><img src="http://www.allegro.cc//djungxnpq2nug.cloudfront.net/image/object/e/2/e2d3dd804030f8f083eb58b8fb679782.jpg" border="0" alt="video" title="Click to play video" /></a></div></div></p><p>Not only does it have Firesheep, it has Firepigs<span class="ref"><sup>[<a href="#">1</a>]</sup></span>
</p><div class="ref-block"><h2>References</h2><ol><li><a href="http://www.youtube.com/watch?v=714-Ioa4XQw">http://www.youtube.com/watch?v=714-Ioa4XQw</a>  ok, I know, not a super pig, but close enough!</li></ol></div></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 03 Nov 2010 14:53:14 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p><a href="http://www.allegro.cc/forums/thread/605425/888485#target">http://www.allegro.cc/forums/thread/605425/888485#target</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Arthur Kalliokoski)</author>
		<pubDate>Wed, 03 Nov 2010 16:10:48 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/888508#target">Arthur Kalliokoski</a> said:</div><div class="quote"><p><a href="http://www.allegro.cc/forums/thread/605425/888485#target">http://www.allegro.cc/forums/thread/605425/888485#target</a></p></div></div><p>
Where do you think I got the link? <img src="http://www.allegro.cc/forums/smileys/wink.gif" alt=";)" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 03 Nov 2010 16:44:24 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>All of the cookie hash is used in every login, it&#39;s not some secure table? <img src="http://www.allegro.cc/forums/smileys/shocked.gif" alt=":o" /><br />Append:<br />Ah, the whole cookie is transfered unencrypted? <img src="http://www.allegro.cc/forums/smileys/lipsrsealed.gif" alt=":-X" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (type568)</author>
		<pubDate>Wed, 03 Nov 2010 17:28:37 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><div class="quote_container"><div class="title"><a href="http://www.allegro.cc/forums/thread/605376/888513#target">type568</a> said:</div><div class="quote"><p>Ah, the whole cookie is transfered unencrypted? <img src="http://www.allegro.cc/forums/smileys/lipsrsealed.gif" alt=":-X" /></p></div></div><p>If http is used, nothing in the headers is encrypted. If https (ssl) is used, then everything is encrypted including the headers.
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (Thomas Fjellstrom)</author>
		<pubDate>Wed, 03 Nov 2010 17:42:00 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p>Lemme guess, SSL is more computational power consuming, and it&#39;s often vital for the servers? <img src="http://www.allegro.cc/forums/smileys/undecided.gif" alt=":-/" />
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (type568)</author>
		<pubDate>Wed, 03 Nov 2010 19:08:52 +0000</pubDate>
	</item>
	<item>
		<description><![CDATA[<div class="mockup v2"><p><a href="http://www.allegro.cc/forums/thread/605376/887581#target">http://www.allegro.cc/forums/thread/605376/887581#target</a>
</p></div>]]>
		</description>
		<author>no-reply@allegro.cc (gnolam)</author>
		<pubDate>Wed, 03 Nov 2010 19:10:58 +0000</pubDate>
	</item>
</rss>
