1. 53
    1. 50

      I think Let’s Encrypt has single-handedly made the internet a much safer place these past 10 years

      1. 7

        I do like them, but at the same time why do I have to encrypt my recipe site? I would like the option in my browser to not warn about sites that don’t use TLS. Or at least to be presented with an option? Oh, this is a reference recipe site. Would you like not to use encryption? Encryption is such a pita for simple things. I do think that sites that accept credentials always need to be encrypted, but why go through the hassle for things that are public? I am very thankful to let’s encrypt and the caddy web server for making certificates. A non-issue, but at the same time I kind of get tired of oh no it’s not encrypted properly warnings which everyone will ignore anyway.

        1. 50

          why do I have to encrypt my recipe site?

          Because your viewers don’t want their ISP to serve them ads in the content.

          1. 31

            Back in ~2012 users of our startup’s iPhone app complained that it crashed when they were on the London Underground (I think, I may be misremembering the details).

            It turned out the WiFi down there was modifying HTML pages served over HTTP, and our app loaded HTML pages that included comments with additional instructions for how the app should treat the retrieved page… and those comments were being stripped out!

            We fixed the bug by switching to serving those pages over HTTPS instead. I’ve used HTTPS for everything I’ve built since then.

            1. 2

              I can sort of understand that since bandwidth was a premium in 2012, so if they could remove as many bytes from the payload as possible, then they increase their network bandwidth overall. Still surprising, but I could at least rationalize it.

              1. 4

                Bandwidth was a premium in 2012? That can’t be right, I feel like 2012 had plenty of bandwidth.

                1. 2

                  No matter how much bandwidth you (an ISP) have, there are always schemes which promise to reduce your usage and thus improve the end-user experience – or invade their experience and make you money.

                  (Some of those schemes actually work. CDNs, for example.)

                  1. 1

                    Of course, but in 2012 I’m pretty sure even homes could get gigabit networking. I don’t think of it as being a bandwidth constrained time.

                    1. 3

                      I lived in Cleveland at the time (major US city) and was still limited to sub-5 megabit ISP service.

                      1. 1

                        Interesting. I wonder if my memory is just off. NYC had really bad internet back then, as I recall, because our infrastructure is buried and expensive to upgrade. But I could swear we had like 100Mbps.

                        Dunno. Crazy to think that 2012 was so long ago.

                        1. 3

                          I looked through my inbox to find what speeds I have had over time.

                          • Dialup, upgrading a few times to 33.6k - I never had a 56k modem. (1995-2001)
                          • 1 mbps dsl (2001-2005)
                          • 2 mbps dsl (2005-2008)
                          • 5 mbps dsl (2008-2012)
                          • 28 mbps cable (2012-2013)
                          • 50 mbps cable (2013-?)
                          • I don’t have speed record for 2013-2020, but Comcast gradually increased it over time, up to gigabit.
                          • 2020-current: 3gpbs fibre
            2. 9

              I both understand and resent this. Bad actors are making my life worse, and for some unfathomable reason it’s legal?!

              If your ISP is manipulating your data it should be sued into oblivion, in a just world.

              1. 7

                It’s not just ISPs, it’s any malicious actor, such as the operator of the wireless access point you’ve connected to (which may not be the person you think it is). You have a choice of either protecting visitors to your site from trivial interception and tampering or leaving them vulnerable. No one is forcing you to choose either way.

                1. 3

                  Well, it’s not a just world in every country.

                2. 3

                  I originally chose to not enable TLS for our game’s asset CDN because checking certs on arbitrary Linux distros is ~unsolvable and we have our own manifest signing so we don’t need TLS’s security guarantees anyway, then we found some ISPs with broken caching that would serve the wrong file for a given URL, so I enabled it and disabled cert verification in the Linux client instead.

                  ISPs don’t even have to be malicious, just crappy…

                  1. 3

                    Why didn’t you just ship your own root certificate? :p

                3. 14

                  It’s sort of self explanatory. Confidentiality and Integrity.

                  1. I know that I’m getting exactly the recipe that you are serving from your site
                  2. I know that no one else can see which recipe I’m cooking
                  3. I know that no one can inject ads, malicious code, tracking, malicious/ abusive images, etc.

                  If you aren’t willing to give those two things to your users I’m really convinced that you just aren’t in a position to host. Recipe site or not, we all have basic obligations. If you can’t meet them, that’s okay, you don’t have to host a website.

                    1. 7

                      because IPSEC failed so it’s up to application protocols to provide secure communication instead of the network layer.

                      1. 5

                        Because the some entities are passively monitoring all traffic worldwide.

                        1. 1

                          Other than ad networks?! /s

                          1. 1

                            But then again, those entities only really need metadata.

                            1. 6

                              HTTPS leaks a lot less metadata than HTTP. With HTTP, you can see the full URL of the request. With HTTPS, you can see only the IP address. There’s a huge difference between knowing that I visited Wikipedia and that I read a specific Wikipedia page (the latter may be possible to determine based on the size of the response, but that’s harder). With SNI, the IP address may be shared by hundreds of domains and so a passive adversary doesn’t even see the specific host, let alone the specific page.

                              1. 3

                                Usually SNI is sent in the clear, because the server needs to know the server name to be able to choose the right cert to present to the client, and it would require an extra round trip to do key exchange before certificate exchange.

                                There’s ongoing work on encrypted SNI (ESNI) but it requires complicated machinery to establish a pre-shared key; it only provides meaningful protection for mass virtual hosters (ugly push to centralize); and it’s of limited benefit without encrypted DNS (another hump on the camel).

                                1. 1

                                  Thanks, SNI does not work how I thought it worked. I assumed there was an initial unauthenticated key exchange and then the negotiated key was signed with the cert that the client said it wanted. I believe QUIC works this way, but I might be wrong there as well.

                                  1. 2

                                    Gosh, I thought QUIC is basically TLS/1.3 with a different transport, but it’s weirder than either of us believed!

                                    • TLS/1.3 illustrated shows the SNI in the client hello in the clear

                                    • QUIC illustrated shows that the initial packet is encrypted with keys derived from a nonce that is sent in the clear in the initial packet; inside the wrapper is a TLS/1.3 client hello

                                    I suppose this makes sense in that QUIC is designed to always encrypt, and it’s harder to accidentally send a cleartext packet if there aren’t any special cases that need cleartext. RFC 9000 says, “This protection does not provide confidentiality or integrity against attackers that can observe packets, but it does prevent attackers that cannot observe packets from spoofing Initial packets.”

                          2. 4

                            Browsers are application runtimes, and plenty of bad actors are all too happy to include their JS software in your pages

                            1. 1

                              it’s not encrypted properly warnings which everyone will ignore anyway.

                              I mean if people are going to ignore the warnings it sounds like you don’t need to enable encryption anyways

                            2. 4

                              This reminds me that Lobsters users are surprisingly vehemently anti-HTTPS: https://lobste.rs/s/zbuc2b/check_for_working_https_before_allowing

                              1. 11

                                That seems an unfair summary of that thread.

                                A better summary is that lobsters users did not support banning insecure HTTP sites from Lobsters.

                                1. 4

                                  I re-read the whole thread and I think it’s fair to say that a lot of the sentiment in the thread (a surprising amount of it) was quite openly anti-HTTPS.

                                  Also I think your terminology is imprecise; I didn’t suggest ‘banning’ HTTP sites from Lobsters, only HTTP link submissions which would benefit from Lobster link juice. I actually said in the thread that users could just post a text submission and then link to it in a comment.

                                  1. 4

                                    Here are the top scoring submissions with ‘http://’ in the URL since the date of your original discussion. All but 3 redirect to HTTPS. As before, I leave it to the community to decide whether forbidding these sites (because that’s what your original proposal amounted to) or requiring someone to jump through user hostile hoops (possibly triggering spam detection) would be worth it.

                                    As to why someone submits a http link when there’s a https one available, maybe they got it from somewhere else (like HN)?

                                    In summary: there’s a time and place to advocate for https only. Making this site worse to use is not that time nor place.

                                    1. “GitHub” Is Starting to Feel Like Legacy Software, posted on 2024-07-12, score: 128 https://lobste.rs/s/euj8no - redirects to https
                                    2. The Pentium as a Navajo weaving, posted on 2024-09-01, score: 72 https://lobste.rs/s/nlblxr - redirects to https
                                    3. A Story About Jessica, posted on 2024-08-01, score: 71 https://lobste.rs/s/trbl7y - redirects to https
                                    4. Demoscene accepted as UNESCO cultural heritage in The Netherlands, posted on 2023-07-05, score: 66 https://lobste.rs/s/lxqkuu - redirects to https
                                    5. ubuntu.ubuntu.ubuntu.ubuntu.ubuntu.ubuntu.ubuntu.ubuntu.ubuntu.archive.ubuntu.com/ubuntu/ubuntu/ubuntu/ubuntu/ubuntu/ubuntu/ubuntu/ubuntu/ubuntu, posted on 2024-07-17, score: 65 https://lobste.rs/s/tdxsxa
                                    6. I think Zig is hard…but worth it, posted on 2023-05-31, score: 60 https://lobste.rs/s/dfs5jc - redirects to https
                                    7. GMail is Marking My Email as Spam, posted on 2023-06-28, score: 52 https://lobste.rs/s/gc4ie8
                                    8. Godot for App Development, posted on 2024-09-27, score: 51 https://lobste.rs/s/lumujn - redirects to https
                                    9. Discord, or the Death of Lore, posted on 2023-03-07, score: 50 https://lobste.rs/s/se8yyg
                                    10. Announcing the official Elixir Language Server team, posted on 2024-08-15, score: 49 https://lobste.rs/s/4ehwpx - redirects to https
                                    1. 1

                                      ion. All but 3 redirect to HTTPS.

                                      In that case I think it makes sense to automatically replace http:// with https:// in all submissions and add a comment with the original http:// URL.

                                      1. 2

                                        I’d accept an addition to the submission which would prompt the submitting user to add https (or add it automatically) if the title fetch check found an alternative. Not gonna code it myself though, life’s too short.

                                    2. [Comment removed by author]

                                    3. 2

                                      FWIW, in my experience there’s been a large vein of anti-HTTPS across lobsters outside of that thread. (Not judging, I don’t care other than it wastes comment space when I also don’t care about avoiding HTTPS)

                                    4. 3

                                      I think it’s safer to say they are against forcing other people to use HTTPS and punishing them and everyone else if they don’t.

                                      1. 2

                                        I think it’s safe to say that not being able to submit an HTTP-only link to Lobsters is kind of a ‘first-world problem’ as punishments go when modern browsers actually make people jump through hoops to visit HTTP-only sites (as they should, imho)

                                        1. 5

                                          Regarding your proposal, I stand by the comment I made 2 years ago. But for what it’s worth I am appalled by the disrespect you show here in this thread.

                                          1. 0

                                            I’m sorry, I don’t know what you are trying to achieve with comments like this, which are completely unproductive and very difficult (for me) to take seriously. It honestly sounds like pearl-clutching like ‘How dare you suggest something that might slightly inconvenience my desire to consume every possible article on the internet!’

                                            1. 9

                                              This is a strange hill to die on. Yeah, more things should be HTTPS. There’s a bunch of older content that hasn’t been updated either. It’s not something I lose sleep at night over, nor do I think of what others think of that.

                                              1. 1

                                                Nor do I, I just find it interesting then that so many others get completely riled up about it, as if I’m here to take away their puppy or something. If you look at gerikson’s comment above only a small fraction of the submissions people are interested in, are HTTP only. So as you point out–why lose sleep over making them slightly more inconvenient to submit?

                                                1. 10

                                                  I don’t think this conversation is convincing people to come around to your position.

                                                  1. 1

                                                    I think a small minority is loudly against it and most people don’t care. Remember the anti-HTTPS sentiment I mentioned earlier? Fairly sure that’s at least part of it.

                                                    1. 4

                                                      I’m not “anti-HTTPS”, but I don’t think there’s much point in limiting submitted links to HTTPS (maybe find the HTTPS version when possible). Again, a lot of older content is out there that hasn’t been updated. It’s a strange hobby horse to get obsessed with and accuse others over though.

                                                      1. 2

                                                        Again, I’m not ‘obsessed’ with it or ‘accusing’ anyone of anything. I’ve brought it up twice in the past two years. I don’t know about you, but I don’t call that an obsession. You’re making it sound as if I’m irrationally pointing fingers at people and shouting ‘anti-HTTPS!’, lol. I just summarized some of the arguments that people raised in the earlier thread. I encourage you to have a read–it’s not a huge thread but a surprising number of people found quixotic and frankly hilarious reasons to be against HTTPS. One person said they saw an instance of the HTTP page being the correct one and the HTTPS version being incorrect. Apparently anecdotes like this are supposed to convince people that HTTPS is untrustworthy 🤷‍♂️

                                                        1. 4

                                                          You suggested that this site should institute a blanket ban on non-https submission links, you got disagreement, and you’re still salty about it.

                                                          Let it go. HTTPs has essentially won, in large part thanks to Let’s Encrypt. Great! Take the win, and let the remaining non https content slowly fade away.

                                                          1. 2

                                                            I’m really not salty lol. Y’all have this fiction about me in your heads, as if I have some irrational obsession and am gnashing my teeth in fury. I really find this whole thing more funny than anything. I got to see a bunch of really dumb reasons to be anti-HTTPS. One person even claimed that HTTPS is less secure because of issues like Heartbleed. That’s the level of argument of anti-HTTPS people.

                                                            Again, we are arguing about a hypothetical here, a suggestion. I’m not coming to take away anyone’s puppy and I had a productive conversation with you earlier about other approaches. I do like the idea of automatically probing for HTTPS support and switching to that if available.

                                              2. 3

                                                I’m removing my reply. Calvin makes a better point than me trying to continue the discussion.

                                        2. [Comment removed by author]