Em maio 10, 2016 1:29 Bob Beck escreveu:

And statements like this - and people that think this is a good idea,
are why I spoof DNS answers in bars and coffee shops, and why I don't
read misc@.  This is never a good idea, unless you want the
connections intercepted and MITM'ed.


I don't see the issue with this Bob. Of course it means the first access is
the one with very high value. But as it is with HPKP, and as it is with SSH
itself. I see that you guys are working on having openbsd included in HTTPS
Everywhere and all. But it still leaves it up to the user. If you put HSTS on
top of a one time redirect, the client will never again access the site using
http. It is a concession. One that you don't seem keen to make. And, on a
second thought, I only care for the anon csv page where you have the ssh host
keys. The rest of the site can be left unencrypted. Until every UA is changed
to first try TLS and *only then* fall back to clear text http, this kind of
measure has its uses.

Cheers,
Giancarlo Razzolini

Reply via email to