this post was submitted on 16 Aug 2023
85 points (90.5% liked)

Technology

59646 readers
2698 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/3301227

Chrome will be experimenting with defaulting to https:// if the site supports it, even when an http:// link is used and will warn about downloads from insecure sources for "high-risk files" (example given is an exe). They're also planning on enabling it by default for Incognito Mode and "sites that Chrome knows you typically access over HTTPS".

all 32 comments
sorted by: hot top controversial new old
[–] [email protected] 29 points 1 year ago (1 children)

Chrome didn’t already default to https? Why?

[–] [email protected] 20 points 1 year ago (1 children)

It does if you just type in something like wikipedia.org . This most recent change they're working on is so that a link on a page to:

http://wikipedia.org will get redirected to https://wikipedia.org if the site supports it.

This will fix a bunch of old links that are still floating around on various sites, forums, etc and keep people on https, instead of doing the https -> http -> https redirect bouncing around that can happen now.

[–] [email protected] 0 points 1 year ago (1 children)

Ah, that’s a great feature. Hope this comes to Brave soon.

[–] [email protected] 9 points 1 year ago (1 children)

I disagree. While in practice, this is often the same website, it is a different protocol and a different port. It just happens to use the same DNS address. You're explicitly giving your browser a FQDN, and it is ignoring it and doing something else.

I hope this feature can be disabled. Google has been ignoring the W3C and has shipped proprietary, insecure features in their chromium engine for a while now, so it wouldn't surprise me if they made it permanent 🤷

[–] [email protected] 9 points 1 year ago (2 children)

What kind of monster would deliberately serve different content for http and https versions of the same URL?

[–] [email protected] 8 points 1 year ago (1 children)

I agree. That would be absurd.

However, I don't like not having the option of using HTTP if I want to use it. It's okay if the webserver redirects me, but I don't like if my browser does it when I didn't tell it to. I might want this when doing development, port tunneling, VPN stuff, etc. In most cases, it won't matter, but when it does, it will be a pain in the ass.

[–] [email protected] 4 points 1 year ago (1 children)

Imagine you want to test your redirect from 80 to 443 when setting up your webserver.

While I think for the normal user this enhances security by defaulting to HTTPS, however this makes no sense for a browser. This should be enforced server side, the browser is for browsing, i.e. viewing. Not controlling and competing with the server software for competency.

Chromium is really leaning into bad code practice with the disregard for "separation of concerns".

[–] [email protected] 2 points 1 year ago

If it's enforced server-side, then there's still an initial connection that is unsecured and can potentially be intercepted/modified before it gets to the redirect from 80 to 443.

[–] [email protected] 0 points 1 year ago

I have, and for quite some time when I was trying to set Https up.

It's really bad IMO to "decide what the user wants" even if this is both discussable and a very small step, it is a step towards that.

[–] [email protected] 19 points 1 year ago (1 children)

Pushing traffic to https isn’t the worst thing. My ask would be to have a toggle to disable due to local development or server deployments where http/port 80 is the only choice.

[–] [email protected] 10 points 1 year ago (2 children)

It does specifically say "defaulting to https:// if the site supports it", so I think specifying http will still work if the site doesn't actually support https.

[–] [email protected] 5 points 1 year ago

Got a message back from Https, let's switch!

The message:

"Internal nginx routing error."

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

No testing a server side http-to-https upgrade/redirect without reconfiguring your browser. This seems like an unnecessary and bad idea.

This could be easily done better by promoting such server-side configurations as a default.

I mean, why should the browser attempt to correct inappropriately configured servers? Shouldn't they rather be making PRs to NGINX/Apache/CAs or whatever?

Also: can't this be exploited to spoof an unavailable HTTPS and coerce an unencrypted connection?

[–] [email protected] 11 points 1 year ago

Not touching chromium or chrome. Sworry! Happy with Firefox.

[–] [email protected] 4 points 1 year ago (1 children)

What's the difference between the two?

[–] [email protected] 14 points 1 year ago (2 children)

I'm not sure which thing you're referring to.

If it's between http and https, the s stands for secure and the connection to the server is authenticated and encrypted.

[–] [email protected] 4 points 1 year ago

Was curious, thanks

[–] hoshikarakitaridia 3 points 1 year ago (1 children)

Just to expand on that, it's a very basic encryption, but it provides a little bit of a safe standard. When ppl talk about "encrypted communication" they usually talk about more than that. For example, apps like telegram use some more advanced encryption iirc.

[–] SimplePhysics 5 points 1 year ago* (last edited 1 year ago) (1 children)

The latest version of TLS (used in the latest version of HTTPS), 1.3, is very secure. Most websites these days support 1.3/128 bits, making it quite hard to crack. One major weakness of HTTPS is that, if a certificate authority is compromised, the hackers can issue certificates for ANY website, which browsers will accept as secure until the certificates are revoked/expired/CA removed from trusted list in browser. This loophole can also be exploited by nation states (forcing the CA to issue certificates).

If you are doing something really private, use something like Matrix (E2EE mode), Signal, or Telegram (E2EE DM).

TLDR: Modern HTTPS is incredibly secure, except there is a loophole that nation states and hackers can exploit if they compromise/gain control of an approved certificate authority. If you are doing something you really dont want anyone to find out (top secret files), use an encrypted service that does not rely on the TLS/SSL/HTTPS stack.

Oh, there was an effort to solve above loophole, I’m not sure if it got anywhere though.

Edit: the point of my comment is to state that HTTPS encryption isn’t necessarily weak, just the handshaking process has some problems.

[–] [email protected] 1 points 1 year ago (1 children)

Is there a secure option that uses all the features minus the 3rd party certificate parts?

[–] SimplePhysics 3 points 1 year ago* (last edited 1 year ago)

No, they were working on a solution a while ago, where a website would list what CA it used so you couldn’t get a random CA to issue a cert, but that effort was abandoned iirc.

[–] [email protected] 2 points 1 year ago

Their Googlebot has been pushing https hard for years. I really don't see the point for mundane sites with no sensitive or controversial content, but there is no way to fight Google so like a good little site operator I go along if I want to be in Google search results.