TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

TLS Everywhere, not https: URIs (2015)

207 pointsby schallertdalmost 9 years ago

17 comments

btraskalmost 9 years ago
Users&#x2F;user agents need to know whether to <i>expect</i> a connection to be secure. Unfortunately, you can&#x27;t necessarily trust any random link you follow to reliably tell you. If I can get you to use HTTP when you should&#x27;ve used HTTPS, I might be able to sniff your traffic. If I can get you to use HTTPS when you should&#x27;ve used HTTP, it might be a DoS.<p>Incidentally, this is the same problem as public key distribution. You need a trusted channel to receive public keys, and a trusted channel to know whether to use a public key. Why can&#x27;t these be the same channel? Right now we have HSTS preloading[1] for the latter, but in that case why not preload certificates (or hashes thereof) too?<p>Then we can finally cut out the middle-men and realize the truth: that the browser is the ultimate certificate authority.<p>[1] <a href="https:&#x2F;&#x2F;hstspreload.appspot.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;hstspreload.appspot.com&#x2F;</a>
评论 #12246259 未加载
评论 #12245320 未加载
评论 #12245387 未加载
评论 #12245681 未加载
评论 #12245745 未加载
评论 #12246639 未加载
ckastneralmost 9 years ago
<i>The problem is of course that moving things from http: space into https space, whether or not you keep the rest of the URI the same, breaks any links to. Put simply, the HTTPS Everywhere campaign taken at face value completely breaks the web.</i><p>Tim Berners-Lee is certainly an authority in the area, but I (an amateur) fail to see any major problem here, let alone one that &quot;completely breaks the web&quot;.<p>Can someone illustrate a use case where either this fatal link-breaking cannot be solved by a simple HTTP-&gt;HTTPS redirect, or any other scenario where the user is so much worse off?<p><i>In a way it is arguably a greater threat to the integrity for the web than anything else in its history. The underlying speeds of connection of increased from 300bps to 300Gbps, IPv4 has being moved to IpV6, but none of this breaks the web of links in so doing.</i><p>I&#x27;d venture to say that IPv6 probably wishes it had the traction that HTTPS Everywhere has...
评论 #12249443 未加载
vtsingarasalmost 9 years ago
The problem with opportunistic TLS is that while it protects from wide-scale DPI it doesn&#x27;t protect against MITM. Personally I think that the effort that would be put to implementing opportunistic TLS in all web servers and browsers would be better put to migrating all web applications to HTTPS only.
评论 #12246893 未加载
dcw303almost 9 years ago
It only breaks the web if you cut everything over from http to https. If you can serve both you don&#x27;t have a problem.<p>This works fine if you use anchors without protocols in your html:<p>a href=&quot;&#x2F;&#x2F;site.com&#x2F;resource&quot;
评论 #12245137 未加载
评论 #12245209 未加载
评论 #12246232 未加载
评论 #12245905 未加载
dredmorbiusalmost 9 years ago
TBL&#x27;s points here are well-made. In particular, there&#x27;s the issue that security is a multidimensional probability field, not a binary state.<p>The questions of secure document transfer and&#x2F;or interchanges are:<p>1. Am I talking to the party I intended to?<p>2. Is the communication free from third-party interception?<p>3. Is the message itself originated by the party I intended?<p>4. Are the <i>contents</i> of that message as originally intended by the author?<p>(Possibly more, but those strike me as the Big Four.)<p>There are various ways for this to fail, and there are different <i>and independent</i> assurances which can be afforded. I remeber the first time I heard phrases to the effect of &quot;you can trust our secure webserver&quot; in the context of commercial transactions, and cringed.<p>The present HTTP &#x2F; HTTPS split addresses only a subset of these concerns, and few of them well, whilst breaking multiple elements of functionality.<p>I will note that TBL seems to be concerned over the expiration of old, previously-valid URLs. To that I can only say that this appears to be a lost battle. The duration of a contemporary URL is on the order of 40-45 days, I think from the Internet Archive. That&#x27;s scarcely longer than an old-school Usenet post might be relied on to persist online, and suggests to me that perhaps the successor to Usenet <i>is</i> the Web, with origins and various archival services (archive.org, archive.is, the NSA, ...) providing robust storage needs to various audiences.
alexbeckeralmost 9 years ago
I find the HTTP&#x2F;HTTPS &quot;ring-fence&quot; or &quot;oil&#x2F;water boundary&quot;, as he describes it, to be the most frustrating aspect of HTTPS, and recently wrote about it in some more detail (and how it might be fixed): <a href="https:&#x2F;&#x2F;alexcbecker.net&#x2F;blog.html#towards-universal-https-adoption" rel="nofollow">https:&#x2F;&#x2F;alexcbecker.net&#x2F;blog.html#towards-universal-https-ad...</a>
amlutoalmost 9 years ago
What exactly is he proposing? Without some additional change, if I make a link to <a href="http:&#x2F;&#x2F;bank.com" rel="nofollow">http:&#x2F;&#x2F;bank.com</a>, any MITM can trivially force an unencrypted connection and somehow the user needs to notice (or be lucky enough to have HSTS know about bank.com).<p>I can see an argument for having DANE-like records include an HSTS instruction, but nothing like that is mentioned in the article.
schallertdalmost 9 years ago
5-10 years and <a href="http:&#x2F;&#x2F;" rel="nofollow">http:&#x2F;&#x2F;</a> will be as rare as having a lottery jackpot. our kids kids will ask - what is this http? like our kids did with floppy disks...
评论 #12247708 未加载
评论 #12245959 未加载
mercoraalmost 9 years ago
if there was just one scheme for both and some kind of protocol upgrade needs to take place wouldn&#x27;t it be easy to manipulate the connection and just doesn&#x27;t let it take place?
velox_ioalmost 9 years ago
I used to think HTTPS everywhere was overkill, then I discovered HTTP2&#x2F; H2. H2 has some massive performance improvements and I believe we have barely scratched the surface of what is possible e.g. once the connection is established there&#x27;s no need for additional HTTP handshakes, massively reducing latency.<p>I&#x27;m also a big fan of Let&#x27;s encrypt, democratizing SSL certificates is only a good thing.
z3t4almost 9 years ago
Since most browsers now a days support SSL&#x2F;TSL it&#x27;s safe to redirect all traffic from http to the same url on httpS.
dmdalmost 9 years ago
Off topic, but I&#x27;m a native english speaker, and have never heard this construction before:<p>&quot;There follow some thoughts following many recent discussions of &quot;HTTPS Everywhere&quot; and points west.&quot;<p>What does &quot;and points west&quot; mean here?
评论 #12248146 未加载
评论 #12248087 未加载
billpgalmost 9 years ago
If we&#x27;re designing in hindsight...<p>Browsers should connect to port 80 and perform a GET for &#x2F;tls-cert with an Accept: header listing all the certificate formats it knows and the applicable Host: header.<p>The server would respond with the certificate for that host-name and the browser would validate it. After that, the HTTP connection would switch into TLS mode using the key in that certificate.<p>If the server responds to this initial request with 404 or some other error, the browser either shows an error or continues in insecure mode.
评论 #12246433 未加载
评论 #12246364 未加载
steve371almost 9 years ago
Looks like ppl didn&#x27;t listen. I saw more https movement this days. and surely enough, it breaks...lots of stuff.
dmh2000almost 9 years ago
as an ignorant user, I would just like to have a browser setting such as &#x27;only talk to sites using TLS&#x27;. I would be happy to deal with the fallout. does chrome or other browser have that?
评论 #12258226 未加载
lifthrasiiralmost 9 years ago
Just in case, note that it is <i>not</i> against &quot;TLS Everywhere&quot;, just against the separation of http: and https: schemes in the URI. TBL essentially argues that http: <i>should</i> upgrade to TLS without any change in the URI (I think that this also implies that, when TLS deployment is finally universal, http: <i>should</i> equal to today&#x27;s https:).
评论 #12245138 未加载
评论 #12245123 未加载
heimataualmost 9 years ago
This is from early 2015. Should be noted in the title, since it more than 18 months old.