OK, talked to someone who seems to know what he is talking about, and
now I agree that scraping/parsing the login form html is the way to
go.
For those who care, here are some key excerpts from a very long and
bla bla IRC session with about 6 people:
#1 providing an elegant API -
The cookie thing that rhys mentioned is the real protection, not "it's
hard to parse html and get the token"
This is doable, but requires messing with the pinax login views, which
is work, and getting the change committed upstream may also be work.
likely more work that me parsing html.
#2: dropping the csrf token from the login form = bad.
UserA = legitimate site user, has an account.
Attacker = baddie who also has an account, like you get by clicking
"sign up!" nothing special needed.
UserA logs in, attacker tricks user into re-loging in using Attacker's
login/pw, now the user does stuff like "send a private message" that
can show up in the attacker's private message log.
Regardless of if anyone cares about this case, it proves there are
cases and so the login form does need the protection given by the
token.
--
Carl K