TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Chrome 68 Released: HTTP Sites Marked as “Not Secure”

109 pointsby l2dyalmost 7 years ago

16 comments

Sol-almost 7 years ago
Surely a good thing since marking HTTPS as &quot;secure&quot; was always a bit misleading and normal users didn&#x27;t understand that you were still subject to phishing attempts and such even with an encrypted transport and authenticated servers.<p>Now it reflects the real world better: HTTPS is necessary but not sufficient for security, but with HTTP only you definitely don&#x27;t have much security. I guess that&#x27;s the best you can guarantee or communicate via the browser UI.
评论 #17608286 未加载
评论 #17608026 未加载
评论 #17608283 未加载
评论 #17607963 未加载
评论 #17607809 未加载
michaeltalmost 7 years ago
So has Google said how they expect router configuration pages, network printers, NAS boxes and other local-network-connected devices to deal with this?<p>I mean, I know Plex has an arrangement where they provide a dynamic DNS style record and they have a special deal with Digicert to issue loads of wildcard certificates [1] but that needs a bunch of infrastructure and a special deal with a CA, as well as precluding offline use and breaking if the supplier ever drops support.<p>And obviously, you can also use a self-signed certificate - but that means teaching users &quot;Just click ignore on the invalid certificate warning&quot; and I&#x27;ve heard people say we shouldn&#x27;t train users to ignore invalid certificate warnings.<p>Is there some alternative solution Google is proposing?<p>[1] <a href="https:&#x2F;&#x2F;blog.filippo.io&#x2F;how-plex-is-doing-https-for-all-its-users&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.filippo.io&#x2F;how-plex-is-doing-https-for-all-its-...</a>
评论 #17607937 未加载
评论 #17607945 未加载
评论 #17608151 未加载
nielalmost 7 years ago
For anyone wondering exactly what the current plan is regarding these secure&#x2F;not-secure indicators in upcoming releases, the Chromium Project has a detailed proposal and timeline: <a href="https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;marking-http-as-non-secure" rel="nofollow">https:&#x2F;&#x2F;www.chromium.org&#x2F;Home&#x2F;chromium-security&#x2F;marking-http...</a><p>Basically it comes down to eventually removing &quot;secure&quot; indicators completely and only indicating when a page is considered &quot;not secure&quot;.<p>As an aside, Let&#x27;s Encrypt has been a godsend to me during this change.
评论 #17609123 未加载
sammorrowdrumsalmost 7 years ago
Anyone else got stories like this?<p>JustHost, one of the hosts I have a few clients websites on for years, suddenly started to offer free Let&#x27;s Encrypt SSL certs to protect users from this change (previously you had to pay for fixed IP, and the certificate itself) - what a great thing to happen.<p>All I had to do was change a few .htaccess files, a few DB entries and track down a few template files that had HTTP external JS references.<p>It was enough work that I had to invoice for the conversion (with the option of not bothering) - but annual fees are still the same, clients websites have SSL and <i>every</i> client wanted the upgrade, rather than be marked &quot;insecure&quot;.<p>I really think this is a breakthrough change!
评论 #17608219 未加载
评论 #17607890 未加载
pilifalmost 7 years ago
As somebody on the dev build train normally I&#x27;ve seen this change for quite a while now and my brain quickly stopped processing the warning on HTTP only sites.<p>I hope that flipping the switch now will cause enough of the remaining non-https sites to start looking into switching before Chrome feels the need to start adding &quot;more prominent&quot; warnings (for example using a modal dialog).<p>I agree that, yes, in general, we should all be using HTTPS on the internet, but non-secured HTTP still makes sense for example during development or for home routers and printers where traffic encryption is less important compared to the initial UX (my parents could probably set up a home router on their own if it&#x27;s using non-encrypted HTTP but they would be totally unable to proceed if it&#x27;s using a self-signed cert).
评论 #17607767 未加载
评论 #17607677 未加载
评论 #17607768 未加载
评论 #17607840 未加载
评论 #17607630 未加载
评论 #17608028 未加载
alanfranzonialmost 7 years ago
For all those that scream about local devices and HTTPS: if you really want HTTPS (and your printer&#x2F;router supports HTTPS) you can get a certificate very easily from let&#x27;s encrypt:<p>- create an &quot;internal&quot; domain for your lan, e.g. home.example.com<p>- make AWS Route53 handle that zone<p>- create some AWS IAM credentials for Route53<p>- create some hosts (e.g. router.home.example.com)<p>- use certbot with the route53 dns option to get a certificate and private key. Certbot will automagically add some TXT records to verify hostname ownership and provide you with that.<p>NO NEED to expose anything on your public IPs, but mind you: your hostname will appear in public CT logs. No &quot;greatnascontainingmypartnersnudephotos.home.example.com&quot; hostnames!
评论 #17608335 未加载
mstaorualmost 7 years ago
In China, many mainstream websites are still HTTP-only. 99% of government websites are HTTP, including the ones you input very sensitive information into. No wonder black data market for any kind of records including medical, surveillance, tax etc. here is so well developed and cheap. Somehow, SSL certificates for CDNs cost around US$2000&#x2F;year. Proprietary DNS extensions on Baidu, Alibaba, and Tencent clouds like 30x redirects do not work with HTTPS at all.
评论 #17608128 未加载
评论 #17607954 未加载
评论 #17607951 未加载
jscissralmost 7 years ago
Not related to the &#x27;not secure&#x27; marking, but on the page it says they fixed a medium severity security bug reported in <i>2014</i>.<p>&gt; [$500][394518] Medium CVE-2018-6169: Permissions bypass in extension installation . Reported by Sam P on 2014-07-16<p>And given the relatively low issue number (e.g. <a href="http:&#x2F;&#x2F;crbug.com&#x2F;394520" rel="nofollow">http:&#x2F;&#x2F;crbug.com&#x2F;394520</a> is from 2014), it&#x27;s not a typo.
评论 #17608168 未加载
manbeenaalmost 7 years ago
Now it&#x27;s time to make local development environment also HTTPS. Make yourself a Certificate Authority CA and issues local certificates. This makes for no warnings in browsers and ensures a better development experience. A post from my colleague on how to do it. <a href="https:&#x2F;&#x2F;reactpaths.com&#x2F;how-to-get-https-working-in-localhost-development-environment-f17de34af046" rel="nofollow">https:&#x2F;&#x2F;reactpaths.com&#x2F;how-to-get-https-working-in-localhost...</a>
omeid2almost 7 years ago
To play the devil&#x27;s advocate and being very cynic (which is always fair game IMHO):<p>This change has the effect of pushing even mundane websites to use SSL, and so locking out corporate-level and other players from analysing web usage, or at least making them less effective, which enhances and increases the Google&#x27;s &quot;web scale&quot; analysis dominant position even more.
评论 #17608175 未加载
评论 #17607826 未加载
评论 #17611081 未加载
lylecubedalmost 7 years ago
I&#x27;m surprised nobody&#x27;s talking about the political implications here. This could do more damage to the open internet than revoking net neutrality.<p>Here&#x27;s a link to hn.algolia.com for the search &#x27;ssl revoked.&#x27;<p><a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?utm_source=opensearch&amp;utm_medium=search&amp;utm_campaign=opensearch&amp;query=ssl%20revoked&amp;sort=byPopularity&amp;prefix&amp;page=0&amp;dateRange=all&amp;type=story" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?utm_source=opensearch&amp;utm_medium=sea...</a>
swebsalmost 7 years ago
Anyone have a screenshot of what the new warning looks like?
评论 #17608005 未加载
megaman22almost 7 years ago
Bit silly for a blanket policy. Who cares if a read-only site is delivered over HTTP, HTTPS, or carrier pidgeon?
评论 #17609118 未加载
jbb67almost 7 years ago
Goodbye chrome then. Basically corporate scumbags pushing their own agenda with just enough plausibility that the gullible will help push their agenda for them.<p>What happened to &quot;do no evil&quot;. Seems to be all google do now.
评论 #17607771 未加载
评论 #17607761 未加载
评论 #17607765 未加载
评论 #17607773 未加载
评论 #17607760 未加载
评论 #17607943 未加载
Dolores12almost 7 years ago
All legacy content heritage that is hosted using http protocol just became not secure in Chrome. What solution does google suggest? Who will pay to upgrade old infrastructure? Pandora box.
评论 #17607790 未加载
评论 #17607822 未加载
评论 #17607866 未加载
评论 #17607987 未加载
评论 #17607833 未加载
mosselmanalmost 7 years ago
How about blogs that only work with JavaScript and external sources allowed? Those sites should be marked as &quot;Not worth your time&quot;
评论 #17607972 未加载