Http 到 Https POST
我们正在启动一个新网站(比如 A),它有用户名/密码,我们的网站是一个 HTTP 网站。我们正在将用户名/密码信息发布到另一个网站,该网站是我们的另一个内部网站(例如 B),但该网站是 HTTPS 网站。我们的“A”站点不处理授权和身份验证,我们也没有数据库,也不会从“A”到“B”进行任何反向通信(用于错误处理之类的内容)。我们把它们全部转移到B网站,再也没有回来。
我的问题是
我从 HTTP 到 HTTPS 网站发布的信息安全吗?如果是,它的安全性如何。如果没有,为什么。
We are launching a new website(say A) and it has Username/Password to it and ours is a HTTP Site. We are POSTING Username/Password information to another site which is our another internal website(Say B) but that website is HTTPS site. Our 'A' site don’t handle Authorization and Authentication and neither we have Data bases nor their going to be any back communications(for error handling stuff like that) to the 'B' From 'A'. we tranfer them to the B website altogether and no coming back.
My Question is
Is the information I am Posting from HTTP to HTTPS site is secure? If yes How its secure. If No why.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
数据从浏览器传输到网站 B 时会被加密,但最终用户无法保证网站 B 就是其声称的身份。可以使用“中间人”攻击,将安全信息传递到虚假站点。
因此,您的登录页面应托管在网站 B 上并使用 SSL (https) 进行传送。
The data will be encrypted from the browser to website B, but the end-user has no assurance that website B is who it claims to be. A "man in the middle" attack could be used which would deliver the secure information to the phony site.
Therefore, your login page should be hosted on website B and delivered using SSL (https).
如果用户可以验证站点 A 上是否没有运行脚本,则可以确保站点 A 的安全。它之所以成为一种普遍不好的做法,是因为它很容易受到中间人的攻击,他们会更改表单目标或在站点 A 的上下文中插入恶意脚本来窃取密码并在密码提交到(安全)之前将其发送出去。 )站点B。
Provided the user can verify the absence of scripts running on site A, it's possible to ensure that it's secure. What makes it a generally bad practice is that it's vulnerable to an active man in the middle who changes the form target or inserts a malicious script in the context of site A to steal the password and send it away before it gets submitted to the (secure) site B.