Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Where does the encryption happen with SSL?

Posted on 2000-03-06
2
206 Views
Last Modified: 2013-12-25
A question about SSL...

When is the information that is sent by https actually encrypted?  If you request https://www.ordersomethingonline.com/ and it's an order form asking for your credit card number and it's sent to http://www.ordersomethingonline.com/cgi-bin/process.cgi (notice the http instead of https on the cgi call) does that mean:

a. The original form is encrypted when it's sent to the user before he fills it out but then what he actually fills out on the form is NOT encrypted when it's sent to the cgi script

or...

b. The content the user types into the form is encrypted when it's sent to the cgi script, but whatever the cgi script echoes back as confirmation is NOT encrypted?
0
Comment
Question by:rmacmich
2 Comments
 
LVL 8

Accepted Solution

by:
jhurst earned 75 total points
ID: 2589599
The browser encrypts and dcrypts data just before sending it when the connection is https, and DOES NOT for HTTP.  So, if the submission of the form is to a http-site - your credit card information is being sent in clear text format.

Realistically there is little risk of someone seeing it.  I think the risk is much less than some wait-person making an extra copy of your credit card in a restuarant etc.  

If you note all of the breaches so far have not been in the transmission of the information but of the information when it arrived and was stored at the server site.  https does not solve this problem.
0
 

Author Comment

by:rmacmich
ID: 2591628
Jhurst -- thanks.  I appreciate your answer and agree with you on both points you made.  :)

Have a good one.

0

Featured Post

Space-Age Communications Transitions to DevOps

ViaSat, a global provider of satellite and wireless communications, securely connects businesses, governments, and organizations to the Internet. Learn how ViaSat’s Network Solutions Engineer, drove the transition from a traditional network support to a DevOps-centric model.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It is a general practice to get rid of old user profiles on a computer  in a LAN environment. As I have been working with a company in a LAN environment where users move from one place to some other place at times. This will make many user profil…
Active Directory replication delay is the cause to many problems.  Here is a super easy script to force Active Directory replication to all sites with by using an elevated PowerShell command prompt, and a tool to verify your changes.
Learn how to match and substitute tagged data using PHP regular expressions. Demonstrated on Windows 7, but also applies to other operating systems. Demonstrated technique applies to PHP (all versions) and Firefox, but very similar techniques will w…
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question