Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 18-Oct-2017 21:27:21 EDT Mike Gerwitz Mike Gerwitz
    @cereal Your link requires JS to view; do you have an alternative link I can look at?

    HTTPS will work as long as it's successfully initiated. If an attacker can inject packets, then they will be able to perform a man-on-the-side attack, where they can send a reply before the remote server sends its own.

    Normally, when a user types "foo.com", if a webserver serves only HTTPS, it'll send a redirect to "https://foo.com". The MotS attack can reply first before such a redirect takes place.

    HTTP Strict Transport Security (HSTS) was made to prevent this sort of thing. The strongest protection is the list of websites distributed with web browsers that force the web browser to connect over HTTPS, always:

    https://hstspreload.appspot.com/
    In conversation Wednesday, 18-Oct-2017 21:27:21 EDT from social.mikegerwitz.com permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.