On Tue, May 10, 2016 at 11:39:44AM +0000, Giancarlo Razzolini wrote:
> Em maio 10, 2016 1:29 Bob Beck escreveu:
> > 
> > And statements like this - and people that think this is a good idea,
> > are why I spoof DNS answers in bars and coffee shops, and why I don't
> > read misc@.  This is never a good idea, unless you want the
> > connections intercepted and MITM'ed.
> > 
> 
> I don't see the issue with this Bob. Of course it means the first access is
> the one with very high value. But as it is with HPKP, and as it is with SSH
> itself. I see that you guys are working on having openbsd included in HTTPS
> Everywhere and all. But it still leaves it up to the user. If you put HSTS on
> top of a one time redirect, the client will never again access the site using
> http. It is a concession. One that you don't seem keen to make. And, on a
> second thought, I only care for the anon csv page where you have the ssh host
> keys. The rest of the site can be left unencrypted. Until every UA is changed
> to first try TLS and *only then* fall back to clear text http, this kind of
> measure has its uses.

We are not working on the HTTPS Everywhere rules for *.openbsd.org. The
guy who sent the pull request is not part of the project.

-- 
Juan Francisco Cantero Hurtado http://juanfra.info

Reply via email to