Internet security in hotels
#1
Original Poster




Join Date: Mar 2007
Location: Orchard Field
Posts: 1,421
Internet security in hotels
Do you feel comfortable logging on to, say, your online bank and brokerage accounts, using a hotel's internet service? Does the answer change if it's a wired connection through an ethernet cable vs a generic wifi/wireless "unsecured network"?
In each case Windows gives a warning like "some information may be visible to others on the network", but does the https sufficiently encrypt it? I mean, if someone got hold of one's online banking password, it would be a pretty major hassle for one to sort out!
In each case Windows gives a warning like "some information may be visible to others on the network", but does the https sufficiently encrypt it? I mean, if someone got hold of one's online banking password, it would be a pretty major hassle for one to sort out!
#3
A FlyerTalk Posting Legend




Join Date: Apr 2001
Location: PSM
Posts: 69,232
Generally speaking the HTTPS sufficiently encrypts the communication even on a wireless connection. Yes, there are still ways to intercept the traffic, but they are much more complicated/difficult.
#4
FlyerTalk Evangelist



Join Date: Nov 2002
Location: ORD
Posts: 14,773
If I'm using my own computer and the site in question is using SSL, I have no problems.
Unless it's a computer I trust, I don't do much beyond facebook/email...and even that is pushing it.
If I'm feeling paranoid and SSL is not an option, I do an SSH tunnel to my home router, and route traffic through that.
Unless it's a computer I trust, I don't do much beyond facebook/email...and even that is pushing it.
If I'm feeling paranoid and SSL is not an option, I do an SSH tunnel to my home router, and route traffic through that.
#5
In Memoriam
Join Date: Feb 2000
Location: Easton, CT, USA
Programs: ua prem exec, Former hilton diamond
Posts: 31,801
What they said.
On my own computer not a problem in my mind as long as the site is secure.
On the lobby computer, or cafe or something like that where there is a good chance of a key logger, nothing like bank or credit card transactions.
On my own computer not a problem in my mind as long as the site is secure.
On the lobby computer, or cafe or something like that where there is a good chance of a key logger, nothing like bank or credit card transactions.
#6
Join Date: Aug 2005
Location: SNA Rwy 20L
Programs: QF Silver
Posts: 703
I know I'm overly paranoid but I won't do anything over hotel internet connections until I VPN into my home router first. Like others have said avoid business center computers as they may have keylogging software installed (not necessarily by the hotel, but it could be installed by other teenage guests.)
HTTPS connections do a quite good job protecting packets, but they don't protect you from tainted DNS servers (i.e., you enter "www.citibank.com" and the bad DNS resolves you to a phishing site which masquerades as the HTTPS version of the original). About 2 years ago I was in a major Vegas hotel and saw that Hotmail resolved to a private 10.10.x.x address instead of over the public internet.
HTTPS connections do a quite good job protecting packets, but they don't protect you from tainted DNS servers (i.e., you enter "www.citibank.com" and the bad DNS resolves you to a phishing site which masquerades as the HTTPS version of the original). About 2 years ago I was in a major Vegas hotel and saw that Hotmail resolved to a private 10.10.x.x address instead of over the public internet.
#7
FlyerTalk Evangelist



Join Date: Nov 2002
Location: ORD
Posts: 14,773
HTTPS connections do a quite good job protecting packets, but they don't protect you from tainted DNS servers (i.e., you enter "www.citibank.com" and the bad DNS resolves you to a phishing site which masquerades as the HTTPS version of the original). About 2 years ago I was in a major Vegas hotel and saw that Hotmail resolved to a private 10.10.x.x address instead of over the public internet.
#8




Join Date: Mar 2008
Posts: 677
yes, that is the purpose of the Verisign certificate, to ensure that the site matches who they say they are. If it is a masquerading site you would get a certificate warning.
Just like what others have posted here I don't usually worry if it is my own computer and HTTPS.
Just like what others have posted here I don't usually worry if it is my own computer and HTTPS.
#9
Join Date: Aug 2005
Location: SNA Rwy 20L
Programs: QF Silver
Posts: 703
I still advocate using a VPN since there still are quite a few vulnerabilities out there, especially if you're not watching carefully. A pretty good report is at: http://people.seas.harvard.edu/~rach...hing_works.pdf
#10
FlyerTalk Evangelist



Join Date: Nov 2002
Location: ORD
Posts: 14,773
I still advocate using a VPN since there still are quite a few vulnerabilities out there, especially if you're not watching carefully. A pretty good report is at: http://people.seas.harvard.edu/~rach...hing_works.pdf
#11

Join Date: Apr 2008
Location: HEL
Posts: 78
While most people are naturally suspicious enough not to fall for this, but some people would just go on and ignore the certificate warning (basically giving a man-in-the-middle a license to read their encrypted traffic).
If you don't get a certificate warning for a site at home, don't just ignore it if it pops up when you connect somewhere else, folks!
But if you really are paranoid, how about looking out for a hidden camera in the room that records all the passwords you type?
If you don't get a certificate warning for a site at home, don't just ignore it if it pops up when you connect somewhere else, folks!
But if you really are paranoid, how about looking out for a hidden camera in the room that records all the passwords you type?
#12

Join Date: Aug 2006
Location: San Jose CA
Posts: 1,100
You have to weigh the risks in life and decide where to expend your energy. Sure, you could VPN back to your company first, but doesn't handing your credit card to a waiter at that same hotel represent a greater risk than traffic sniffing? If you're concerned about identity fraud, get protection for that - for example, Californians can contact credit agencies and freeze their credit.
Consider the risk of being attacked by a shark to the risk of driving to the beach while talking on your cell phone. Like the traffic sniffing, the shark attack is possible, and wearing chain mail while swimming in the ocean will certainly reduce your risk of shark attack. So some would say: "why take the chance, always wear chain mail." But you're really much safer ignoring the sharks and putting down the cell phone.
Consider the risk of being attacked by a shark to the risk of driving to the beach while talking on your cell phone. Like the traffic sniffing, the shark attack is possible, and wearing chain mail while swimming in the ocean will certainly reduce your risk of shark attack. So some would say: "why take the chance, always wear chain mail." But you're really much safer ignoring the sharks and putting down the cell phone.
#13
FlyerTalk Evangelist

Join Date: Jul 2003
Posts: 11,377
I also use a VPN (witopia.net).
I also only use SSL to check my e-mail accounts (gmail defaults to non-SSL, but you can change the setting to force SSL, for example).
My use of the VPN is primarily to deal with sites that don't use SSL and yet still are info that, although not particularly sensitive, I don't want to be just "in the air". I don't like snoops, and without a VPN, non-SSL webpages are viewable in plain text over non-secured WiFi connections.
I also only use SSL to check my e-mail accounts (gmail defaults to non-SSL, but you can change the setting to force SSL, for example).
My use of the VPN is primarily to deal with sites that don't use SSL and yet still are info that, although not particularly sensitive, I don't want to be just "in the air". I don't like snoops, and without a VPN, non-SSL webpages are viewable in plain text over non-secured WiFi connections.
#14
FlyerTalk Evangelist




Join Date: Dec 2006
Location: Pacific Northwest
Programs: UA Gold 1MM, AS Plat, AA EP, Bonvoy Plat, Hilton Dia, Hyatt Glob, IHG Plat, ...
Posts: 21,487
Taking this slightly off-track, what home VPNrouter do you guys recommend? Should have support for Windows and Mac.
Back on topic, right now I am generally use my employer's VPN when I am on a network I don't trust (which is pretty much always when I am not at home).
Back on topic, right now I am generally use my employer's VPN when I am on a network I don't trust (which is pretty much always when I am not at home).
#15




Join Date: Jul 2001
Location: Lower Merion Township, PA, (an inner-ring suburb to the Socialist Workers City/State of Philadelphia, PA)
Posts: 597
Some things I saw when I tried to do this: some routers limit the bandwidth available this way. Windows seems to be the only free VPN client that I see out there. And some VPN routers require a static IP address for both the router and the client (which is not possible when traveling).

