TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

GitHub Pages generated a TLS cert for my own domain

120 pointsby suixoabout 7 years ago

15 comments

_hyn3about 7 years ago
This is a feature, not a bug.<p>You asked them to host your site. They secured it.<p>Github is the designated endpoint for your site traffic, so they can not be &#x27;rogue&#x27;. You <i>explicitly</i> granted them control over that endpoint, and their securing that traffic does not diminish your security in any way.<p>It&#x27;s free hosting, version controlled, and now with a free TLS security upgrade. That&#x27;s actually pretty awesome.
regecksabout 7 years ago
I mean, it&#x27;s kind of overstated to call it rogue. A new feature of Github hosting, sure. It&#x27;s a pretty common practice to do it automatically in hosting and CDNs. cPanel does it, Cloudflare does it (by themselves adding up to 10-20+% of all certificates currently trusted), a immeasurable number of SaaS-es and blogging&#x2F;ecommerce platforms do it. I saw one user freak out when FastMail started doing it too for domains pointed to their static hosting.<p>From a Web PKI perspective I feel it&#x27;s fine. DV is DV after all.<p>I do always create CAA records for my owns domains though, even if it&#x27;s just:<p><pre><code> issue &quot;;&quot; issuewild &quot;;&quot;</code></pre>
评论 #16866311 未加载
Mojahabout 7 years ago
If you don&#x27;t want this, you can prevent this by setting CAA DNS records on your own domain. How this works is described here: <a href="https:&#x2F;&#x2F;ma.ttias.be&#x2F;caa-checking-becomes-mandatory-ssltls-certificates&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ma.ttias.be&#x2F;caa-checking-becomes-mandatory-ssltls-ce...</a><p>You can validate if they&#x27;ve been configured correctly here: <a href="https:&#x2F;&#x2F;dnsspy.io&#x2F;labs&#x2F;caa-validator" rel="nofollow">https:&#x2F;&#x2F;dnsspy.io&#x2F;labs&#x2F;caa-validator</a><p>The article is pretty strongly worded for something that isn&#x27;t all that bad. Yes, they issued a certificate, but you&#x27;ve sort-of given them permission to do so by hosting your content with them. If they own&#x2F;control the server, they can get their certs validated.<p>It&#x27;s a pretty good example of why you&#x27;d want something as Certificate Transparency even on HTTP-only domains, to know _when_ someone issues a certificate without you knowing about it. I use Oh Dear! app for that feature: <a href="https:&#x2F;&#x2F;ohdearapp.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ohdearapp.com&#x2F;</a>
评论 #16866512 未加载
评论 #16866974 未加载
评论 #16866514 未加载
snowwolfabout 7 years ago
This is the intended behaviour and something Github Pages users have been asking a long time for: <a href="https:&#x2F;&#x2F;github.com&#x2F;isaacs&#x2F;github&#x2F;issues&#x2F;156" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;isaacs&#x2F;github&#x2F;issues&#x2F;156</a><p>It&#x27;s using LetsEncrypt under the hood, and only generating a cert for the custom cname pointing at the Github page.
y4miabout 7 years ago
I really don&#x27;t see the problem. Once you set your cname record to GitHub, you&#x27;ve essentially yielded all control to them.<p>If you don&#x27;t like that, don&#x27;t set a cname record.
评论 #16866479 未加载
评论 #16868452 未加载
colinbartlettabout 7 years ago
There was some discussion recently on this pull request that Github was rolling this out to some accounts:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;isaacs&#x2F;github&#x2F;issues&#x2F;156" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;isaacs&#x2F;github&#x2F;issues&#x2F;156</a>
评论 #16866808 未加载
iofiiiiiiiiiabout 7 years ago
You gave GitHub the right to use your domain to serve content (including over HTTPS) when you pointed your domain at GitHub servers. This is not a problem.
评论 #16866677 未加载
suixoabout 7 years ago
OP here. Thanks to all your rich comments, I have updated the post with the final conclusion:<p><i>GitHub is gradually (and silently) deploying HTTPS to custom-domains websites hosted on GitHub Pages, using DV from Let&#x27;s Encrypt</i>.
anilgulechaabout 7 years ago
This would be good, preferable and the right thing to do, expect with intimation, and an opt-out.<p>The author has the right to be annoyed that this was done without notification. (though I would say despite how it was done, there was no-harm no-foul here). I also eagerly await this change to my own github-pages hosted custom domain sites.
ams6110about 7 years ago
I didn&#x27;t realize they were doing this, but sure enough a domain I host on github pages now responds on https with a Lets Encrypt cert. Cool.<p>They are not redirecting port 80 traffic though, at least not yet.
coroboabout 7 years ago
&gt; TL;DR: This blog is hosted on GitHub Pages,<p>In my books that&#x27;s not rogue. If you don&#x27;t trust them to serve https why are you trusting them to serve http? Feels a bit outrage for the sake of it
评论 #16866439 未加载
icebrainingabout 7 years ago
Somewhat ontopic, I find interesting that Cloudflare is issuing certificates for HN, despite HN serving a Comodo cert.<p><a href="https:&#x2F;&#x2F;crt.sh&#x2F;?id=182943715" rel="nofollow">https:&#x2F;&#x2F;crt.sh&#x2F;?id=182943715</a>
评论 #16867536 未加载
snissnabout 7 years ago
It&#x27;s kind of github to only make the ssl cert valid for ~90 days<p><a href="https:&#x2F;&#x2F;www.sslshopper.com&#x2F;ssl-checker.html#hostname=blog.securem.eu" rel="nofollow">https:&#x2F;&#x2F;www.sslshopper.com&#x2F;ssl-checker.html#hostname=blog.se...</a><p>&gt; The certificate will expire in 87 days.<p>Good reminder for everyone to check their cert expirations!
评论 #16867487 未加载
hidiegomarianiabout 7 years ago
You can use CloudFlare HTTPS + Github Pages = 100% free hosting with SSL
评论 #16866830 未加载
评论 #16868052 未加载
subpixelabout 7 years ago
I have pages on Netlify with their one-click SSL, and more than once the certificate has (here my ignorance becomes apparent) stopped working, breaking the site (since https is forced server-side and&#x2F;or cached by browsers like Safari). To get the site up and running again I&#x27;ve needed to contact support and have them manually issue a new certificate.<p>Maybe this is way easier than handling things on my own, but it seems like an achilles heel of fully automated SSL.
评论 #16866612 未加载