this post was submitted on 16 Aug 2023
77 points (93.3% liked)

Technology

59428 readers
2843 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

cross-posted from: https://lemmy.world/post/3301227

Chrome will be experimenting with defaulting to https:// if the site supports it, even when an http:// link is used and will warn about downloads from insecure sources for "high-risk files" (example given is an exe). They're also planning on enabling it by default for Incognito Mode and "sites that Chrome knows you typically access over HTTPS".

you are viewing a single comment's thread
view the rest of the comments
[–] LordXenu@artemis.camp 18 points 1 year ago (3 children)

Pushing traffic to https isn’t the worst thing. My ask would be to have a toggle to disable due to local development or server deployments where http/port 80 is the only choice.

[–] lily@shinobu.cloud 9 points 1 year ago (2 children)

It does specifically say "defaulting to https:// if the site supports it", so I think specifying http will still work if the site doesn't actually support https.

[–] Valmond@lemmy.mindoki.com 4 points 1 year ago

Got a message back from Https, let's switch!

The message:

"Internal nginx routing error."

[–] dust_accelerator@discuss.tchncs.de 2 points 1 year ago* (last edited 1 year ago)

No testing a server side http-to-https upgrade/redirect without reconfiguring your browser. This seems like an unnecessary and bad idea.

This could be easily done better by promoting such server-side configurations as a default.

I mean, why should the browser attempt to correct inappropriately configured servers? Shouldn't they rather be making PRs to NGINX/Apache/CAs or whatever?

Also: can't this be exploited to spoof an unavailable HTTPS and coerce an unencrypted connection?