Sponsored Content
Special Forums Cybersecurity https MITM attack via user page Post 302519997 by GSO on Thursday 5th of May 2011 02:46:49 PM
Old 05-05-2011
3) Switched to Chrome, unable to access the secure login page of my electricity supplier and with the same error, encrypted page includes non-encrypted content: https://www.britishgas.co.uk/Login/L...toploginbutton With dummy login info the page instead of reporting a login error redisplayed itself identically. The next dummy login resulted in what I assume was the correct red text and login error. The same https error occurs whether Tor is running or a direct connection or following restarting the tor service, both from the guest and host (firefox). Note though the same page opens securely on my Android. (HTML of the page giving the error attached.)

4) The Chrome delicious plugin works intermittently, with various bugs randomly exhibited (the popup redisplaying itself cleared on submit; the popup form incorrectly laid out and/or of varying height; predictive tag completion text not displaying [edit 6/5/11: displaying predictive text tags twice in the select list).

Netstat on both host and guest do not show anything that I would consider unusual (I am not a network admin. though). If anyone can point me in the direction as to what to look at next?

[Quick update to the above, about an hour or so later the network lost its sluggishness, the British Gas secured login page became fully accessible without any errors, and the Delicious plugin is working flawlessly (as it should!).]

Last edited by GSO; 05-06-2011 at 12:40 PM..
 

5 More Discussions You Might Find Interesting

1. Web Development

HTTPS-Home Page issue.

Hi Folks, This might be a very question,but i have not been able to find the solution. While accessing http://16.138.32.128/ in my LAN, i am able to read the index.html placed in DocumentRoot(/var/www/html). However if i tab in https://xx.xx.xx.xx/ ,i am only able to access the default... (0 Replies)
Discussion started by: Hari_Ganesh
0 Replies

2. What is on Your Mind?

Fedora Man Pages Reported Attack Page?

Is firefox complaining to anyone else that this is a Reported Attack Page!? I have used this site a million times and now it feels like complaining. Fedora Manpages: Home (5 Replies)
Discussion started by: cokedude
5 Replies

3. Shell Programming and Scripting

help pulling ${VARS} out of a web page user curl

Here is the code I have so far #!/bin/bash INFOF="/tmp/mac.info" curl --silent http://www.everymac.com/systems/apple/macbook_pro/specs/macbook-pro-core-2-duo-2.8-aluminum-17-mid-2009-unibody-specs.html "$INFOF" I want help putting these specs into a vars Standard Ram: value into $VAR1... (1 Reply)
Discussion started by: briandanielz
1 Replies

4. UNIX for Dummies Questions & Answers

How to switch the user before executing a shell script from web page??

hi, i want to execute a shell script as a different user. the flow is like this. there is a html web page from which i have to call a shell script. web server is apache. to call the shell script from html page, a perl script is required. so the html page calls the perl script and the perl... (2 Replies)
Discussion started by: Little
2 Replies

5. Solaris

Need suggestion:- Failed HTTPS transfer to https://supportfiles.sun.com/curl

Hi Guys, I have recently started reciving below Error message Failed HTTPS transfer to https://supportfiles.sun.com/curl whenever I run /usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v from all Servers. Looks like the SSL certificate as Expired. Whenever I type... (4 Replies)
Discussion started by: manalisharmabe
4 Replies
SECURETTY(5)						     Linux Programmer's Manual						      SECURETTY(5)

NAME
securetty - file which lists terminals from which root can log in DESCRIPTION
The file /etc/securetty contains the names of terminals (one per line, without leading /dev/) which are considered secure for the transmis- sion of certain authentication tokens. It is used by (some versions of) login(1) to restrict the terminals on which root is allowed to login. See login.defs(5) if you use the shadow suite. On PAM enabled systems, it is used for the same purpose by pam_securetty(8) to restrict the terminals on which empty passwords are accepted. FILES
/etc/securetty SEE ALSO
login(1), login.defs(5), pam_securetty(8) COLOPHON
This page is part of release 4.15 of the Linux man-pages project. A description of the project, information about reporting bugs, and the latest version of this page, can be found at https://www.kernel.org/doc/man-pages/. Linux 2015-03-29 SECURETTY(5)
All times are GMT -4. The time now is 01:20 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy