TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why Your Static Website Needs HTTPS (2018)

153 点作者 codesections超过 5 年前

22 条评论

tristador超过 5 年前
The recommendation of Cloudflare here seems poor. Using CF to make an HTTP only site support HTTPS will only prevent MITM between CF and the end user. MITM between my server and CF is not improved as it&#x27;s still HTTP. Yes, you can add a self signed cert and tell CF not to check the cert validity, but that doesn&#x27;t prevent MITM.<p>Worse, Cloudflare can inject JavaScript into your site. The default settings will show Captchas to users if CF thinks they are not trustworthy. So you end up with MITM anyway if you aren&#x27;t careful. For a static site, does a captcha really make sense? Cloudflare makes the internet worse with insane defaults like this.<p><a href="https:&#x2F;&#x2F;community.cloudflare.com&#x2F;t&#x2F;getting-cloudflare-captchas-every-website-i-visit&#x2F;9277" rel="nofollow">https:&#x2F;&#x2F;community.cloudflare.com&#x2F;t&#x2F;getting-cloudflare-captch...</a> <a href="https:&#x2F;&#x2F;www.techrez.com&#x2F;remove-cloudflare-challange-page&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.techrez.com&#x2F;remove-cloudflare-challange-page&#x2F;</a>
评论 #22146874 未加载
评论 #22147143 未加载
评论 #22147322 未加载
评论 #22146887 未加载
评论 #22146886 未加载
MaxBarraclough超过 5 年前
I was disappointed the article is so thin on real substance. It could have listed out the reasons to always use HTTPS. Easily done:<p>1. Privacy matters. A medical website, or indeed Wikipedia, should prevent a snooping ISP from finding out you have been reading about an embarrassing condition. This is similar to the way librarians are extremely protective of their loan records [0]. Netflix use HTTPS for their streams, for the same reason (it does nothing to aid their DRM, it&#x27;s purely about privacy) [1].<p>2. HTTPS prevents ads&#x2F;trackers&#x2F;malware being injected into the page by unscrupulous ISPs (this really has happened [2])<p>3. Modern browsers will (rightly) warn users not to trust the site. This makes the site look bad.<p>4. Some fancy browser features are disabled if you use unencrypted HTTP. Likely irrelevant for a static site though.<p>5. Let&#x27;s turn the tables and ask why you wouldn&#x27;t use HTTPS for a public-facing web server. There are just 3 reasons:<p>* Reduced admin overhead not having to bother with certs<p>* It enables caching web proxies, which is only relevant if you&#x27;re running a serious distribution platform like Steam, or a Linux package-management repo [3]<p>* Better support for very old devices, such as old smartphones in the developing world<p>[0] <a href="https:&#x2F;&#x2F;www.theguardian.com&#x2F;us-news&#x2F;2016&#x2F;jan&#x2F;13&#x2F;us-library-r.." rel="nofollow">https:&#x2F;&#x2F;www.theguardian.com&#x2F;us-news&#x2F;2016&#x2F;jan&#x2F;13&#x2F;us-library-r...</a>.<p>[1] <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2015&#x2F;04&#x2F;it-wa.." rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2015&#x2F;04&#x2F;it-wa...</a>.<p>[2] <a href="https:&#x2F;&#x2F;doesmysiteneedhttps.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;doesmysiteneedhttps.com&#x2F;</a><p>[3] <a href="https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;whydoesaptnotusehttps.com&#x2F;</a><p>(Taken from an old comment of mine at <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=21912817" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=21912817</a> )<p><i>Edit: Added the third reason not to use HTTPS</i>
评论 #22148212 未加载
评论 #22154356 未加载
评论 #22147969 未加载
robrtsql超过 5 年前
The exchange between Troy Hunt and Jacob Baytelman is a little aggravating for me--they appear to be talking past each other.<p>Jacob challenges him to &quot;hack [his] static blog&quot;. I don&#x27;t know what &#x27;hacking a website&#x27; means to him, but to you and me it probably means compromising the web server, which is not directly related to HTTPS (although I can think of a lot of ways that the use of HTTP could lead to a web server being compromised).<p>Troy responds by taking him up on this challenge, accuses Jacob of thinking that his site is immune from transport layer risks, and then performs a man in the middle attack on himself using Jacob&#x27;s site (when in reality literally any HTTP site could have been used).<p>It&#x27;s like these two are having completely separate conversations.
评论 #22146771 未加载
jpxw超过 5 年前
Certbot and LetsEncrypt make this a trivial process these days. Takes 15 minutes to set up and is free. Why not use it?
评论 #22148037 未加载
评论 #22148907 未加载
评论 #22146818 未加载
评论 #22146846 未加载
djsumdog超过 5 年前
The first time I saw a mobile&#x2F;prepaid ISP inject their notices on my own personal website, I realize I needed to get off my lazy ass and setup LetsEncrypt.
mmphosis超过 5 年前
CITM - detected Corporations In The Middle (CITM) attack. requests blocked 15%, cdn.example.com dnjs.cloudyfaire.com troymcclure.disqus.com fonts.noodleapis.com fonts.noodlestatic.com platform.example.com noodletube.com example.com<p>https is easy. point everything DNS everything to cloudyfiare and click Purchase and by clicking Purchase agree to all the terms (but don&#x27;t actually read any of them.) hand over root access to a program with the word bot in it, and allow it to update itself automatically (what could possibly go wrong.) Everything HTTPS all the time. <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DigiNotar" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DigiNotar</a><p>call me skeptical, or the many ( <a href="https:&#x2F;&#x2F;slate.com&#x2F;technology&#x2F;2020&#x2F;01&#x2F;what-to-know-about-the-controversy-over-the-sale-of-org.html" rel="nofollow">https:&#x2F;&#x2F;slate.com&#x2F;technology&#x2F;2020&#x2F;01&#x2F;what-to-know-about-the-...</a> <a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;kazakhstan-government-is-now-intercepting-all-https-traffic&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;kazakhstan-government-is-now-i...</a> <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DNS_over_HTTPS#Criticism" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;DNS_over_HTTPS#Criticism</a> ) many reasons Why My Static Website No Longer Exists.
zelly超过 5 年前
Devil&#x27;s advocate: HTTPS centralizes the web around big players. The CA trust model gives a privileged few the right to say what websites are &quot;secure&quot;, even in cases where no user input goes down the wire. &quot;Not Secure&quot; in the top left brands and shames amateurs. <i>Come on, just make a Medium page! You should be posting this on a FAANG property!</i> Let&#x27;s Encrypt is great, but don&#x27;t forget that it could disappear overnight--after every browser started de facto blocking non-HTTPS traffic.
评论 #22149713 未加载
评论 #22147629 未加载
pmlnr超过 5 年前
&gt; HTTPS Is Easy<p>It is not easy at all. Getting a certificate and putting it into the conf is. Maintaining that certificate, applying the ever growing number of &quot;security&quot; headers, dealing with broken stapling, is anything, but easy.
评论 #22148470 未加载
评论 #22150504 未加载
henvic超过 5 年前
Back in early 2009, I was launching a file storage web service similar to Dropbox (without the client, but with an API with OAuth 1 support) using AWS Ec2 and S3. I planned to use HTTPS, but it was expensive for me (as a college dropout), and the website is still online without it. I abandoned the project afterward. Recently, I started to migrate it from AWS to Google Cloud Platform, and one of the goals was to add HTTPS to it. However, I haven&#x27;t had much time to finish the migration, and it&#x27;s still not being served as HTTPS (even though it has all other sorts of protection that were the norm back then). I wonder how many other &quot;legacy websites&quot; have a similar issue (which I don&#x27;t find justifiable for anything &#x27;in production&#x27;).
评论 #22146607 未加载
评论 #22146606 未加载
评论 #22147173 未加载
评论 #22147782 未加载
zxcvbn4038超过 5 年前
This article is two years old - think it’s been well established that sites need https, if for no other reason then browsers and search engines punish you in a variety of ways for not having it. Certificates are free with let’s encrypt so there is no excuse not to anymore.<p>In the case of Cloudflare (or any CDN) best practice is to reject requests not from the CDN. Cloudflare doesn’t support AWS S3 compatible storage directly - it won’t make signed requests - but you can write IAM policy that only responds to certain IP.
评论 #22147311 未加载
评论 #22148070 未加载
tristador超过 5 年前
Note: 2018.<p>Troy talks about a tipping point, which was Jan 2017.
jstewartmobile超过 5 年前
HTTPS PR is not the internet&#x27;s defense against hackers. It&#x27;s FAANG&#x27;s defense against Comcast and AT&amp;T.
pragnesh超过 5 年前
I have found one of isp used to inject ad on http page and user has no idea how this popad apear. http protocol need to die.
tristador超过 5 年前
&gt; In one of many robust internet debates (as is prone to happen on Twitter)<p>Maybe I just don&#x27;t get Twitter. Every time I look at a thread it starts with some coherent conversation, but then devolves into a bunch of tangents that don&#x27;t coherently follow each other.<p>HN and similar seem much better suited.
评论 #22146855 未加载
ronyfadel超过 5 年前
I’m stuck in a related situation: I own a website with heavy traffic that contains inline iframes to some http pages (about 30% of pages) hosted by third parties. I can’t turn https on for my website, otherwise these iframes would be blocked by the browser. Since I don’t offer https, it means that I can’t offer features such as login&#x2F;sign up etc.. Any ideas?
评论 #22147257 未加载
评论 #22147949 未加载
评论 #22147140 未加载
评论 #22147275 未加载
bullen超过 5 年前
HTTPS is bad:<p>- It wastes resources.<p>- It adds complexity.<p>- You can solve everything HTTPS solves over HTTP!<p>- It encourages passive destructive behavior.<p>- Troy Hunt probably has money coming in from certificates somehow.<p>HTTP&#x2F;2 and HTTP&#x2F;3 are also bad.<p>WebSockets are bad.<p>As a side note:<p>Vulkan is bad.<p>HDMI is bad.<p>Wakeup people. Time to get off that over-engineering couch and downvote the guy telling the truth again!
评论 #22148149 未加载
dang超过 5 年前
Discussed at the time: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17857975" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=17857975</a>
pmlnr超过 5 年前
Yes, add HTTPS, but keep the option for mere HTTP, because backwards compatibility is good.<p>Many parts of the world can&#x27;t deal with TLS1.3 HTTP&#x2F;2 websites only.
评论 #22148181 未加载
评论 #22148084 未加载
known超过 5 年前
To prevent <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Man-in-the-middle_attack" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Man-in-the-middle_attack</a>
dvfjsdhgfv超过 5 年前
There are almost no arguments given, but all the other ones are nicely rebutted on n-gate:<p><a href="http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:hV6m26a8hrAJ:n-gate.com&#x2F;software&#x2F;2017&#x2F;" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:hV6m26a...</a>
jstewartmobile超过 5 年前
Without HTTPS, Russians could MITM my knitting blog any minute now!<p>Indefinitely babysitting letsencrypt is a small price to pay to keep those grannies safe!
评论 #22147604 未加载
superkuh超过 5 年前
The problem with these calls for HTTPS is that those doing it believe http and https are mutually exclusive. They completly turn off human navigable webservers and leave only the machine navigable ones online. It makes the web only accessible to computer software written in the last 5 years.<p>There are plenty, I&#x27;d say most, websites which do <i>not</i> need HTTPS. And my static website does not <i>need</i> https. It&#x27;s nice, sure, but it&#x27;s a personal website and there&#x27;s no money or personal information involved. Leaving an HTTP version going alongside the HTTPS and Tor hidden service is just fine.<p>The greater evil is having people run third party code by default on every website from every random domain that&#x27;s called. Now that&#x27;s insecure. It&#x27;s like opening every email attachment you get. Every single &quot;danger&quot; of HTTP he lists is actually a danger of running third party code blindly and automatically.
评论 #22146717 未加载
评论 #22146545 未加载
评论 #22146528 未加载
评论 #22146640 未加载