Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

access to the site should use SSL #224

Closed
cgolubi1 opened this issue Nov 27, 2013 · 20 comments · Fixed by #2712
Closed

access to the site should use SSL #224

cgolubi1 opened this issue Nov 27, 2013 · 20 comments · Fixed by #2712

Comments

@cgolubi1
Copy link
Contributor

We should serve the website via HTTPS as well as HTTP, and we should force access to pages which send passwords back and forth (meaning the Newuser stuff, the Login stuff, and responder.php itself unless we can split out the login functions of responder into a different file) to occur via HTTPS. The purpose is to protect passwords from being sent in cleartext.

@Caligari
Copy link

My experience in the past has been that it is easier (and no less safe) to put the SSL over the whole site, rather than trying to get it to cover only some pages. It does not, in the main, harm your accessibility in any way. So I'd redirect all HTTP to HTTPS when you set it up, and leave it at that.

@Caligari
Copy link

It is worth checking that your certificate is properly located by dumber earlier versions of IE (I want to say IE 7, but I'm not sure) some of which (under XP, if I'm not mistaken) ask for the wrong file. I'm afraid I don't have the details of this problem (and its solution) to hand, but I'll try to track them down.

@cgolubi1
Copy link
Contributor Author

Yep, agreed --- i think SSL over the whole site is easiest. Just wanted to make clear in the ticket report that the passwords are the main issue.

@Caligari
Copy link

searching for:

Why do I get I/O errors when connecting via HTTPS to an Apache+mod_ssl
server with Microsoft Internet Explorer (MSIE)?

http://httpd.apache.org/docs/2.2/ssl/ssl_faq.html

So it might or might not be a problem here, depending on our setup?

(IE: so broken it as its own entry in the ssl faq for apache.)

@blackshadowshade
Copy link
Contributor

That's a good catch, Caligari!

@blackshadowshade
Copy link
Contributor

@blackshadowshade
Copy link
Contributor

Right, looks like we might to move this up in our priorities. Limax seems to be having firewall or noscript issues from work, and Julian reckons that a change to SSL might fix this issue for him.

@blackshadowshade
Copy link
Contributor

I'm choosing this as my BotM for February.

@danlangford
Copy link
Contributor

FWIW I have bought many SSL certs over the years and the cheapest one I have found that actually works and isn't from some shady website is Comodo PositiveSSL from Namecheap's store it's $9/yr. I would love to donate some money to cover the SSL costs for a few years.

https://www.namecheap.com/security/ssl-certificates/comodo/positivessl.aspx

@cgolubi1
Copy link
Contributor Author

cgolubi1 commented Jan 4, 2016

Thanks, Dan. We'll try hard to get to this in the next few months.

@ericeslinger
Copy link

Yah, I have bought a few from the same site - namecheap reselling comodo positiveSSL. Was pretty straightforward to get the certificate and plug it into nginx, which is what I use for my reverse-proxy whatever for all my production webapps. The only real tricky bits are if you are really into security and want to deal with export attacks or weaknesses in the elliptical curve something or other. Even then, it's mostly config files. I'd just rather (a) not having the site subject to ad injection from third party ISPs and (b) not having my password transmitted in the clear. Neither of those require super-complicated big-expense certs.

@lukehankins lukehankins assigned lukehankins and unassigned cgolubi1 Jun 9, 2016
@lukehankins
Copy link
Contributor

Current plan is to create a self-signed cert that puppet installs for non-public (other than dev.buttonweavers.com and www.buttonweavers.com) instances and a cert from www.letsencrypt.org for those.

@blackshadowshade
Copy link
Contributor

How are we going with this, @lukehankins? Any progress?

@lukehankins
Copy link
Contributor

Real life has intruded, unfortunately, so no progress to report. Happy to unassign it if anyone else wants to snag it.

@blackshadowshade
Copy link
Contributor

Is there a chance that you might be able to work on this sometime before Christmas? Or are you flat out?

@lukehankins lukehankins removed their assignment Nov 14, 2016
@lukehankins
Copy link
Contributor

Flat out, unfortunately. I've unassigned it.

@blackshadowshade blackshadowshade mentioned this issue Sep 8, 2018
15 tasks
@blackshadowshade
Copy link
Contributor

I have a top tip from a friend who I just happened to bump into on the train today. He says that he used Let's Encrypt to enable SSL on his private Ubuntu server, and the whole process took in the order of 15 minutes, start to finish. The certificate and process is free (although they're open for donations), and the certificates are automatically renewed.

When we do the site upgrade, I think it would be worth trying this out.

@blackshadowshade
Copy link
Contributor

The specific instructions for Apache on Ubuntu are here:

https://certbot.eff.org/lets-encrypt/ubuntuartful-apache

@danlangford
Copy link
Contributor

ya i would now redact my earlier advice (2016) and suggest Let's Encrypt. any assistance needed here?

@blackshadowshade
Copy link
Contributor

I believe that Chaos has had good experiences with Let's Encrypt in another private project of hers, so she's also thinking this is the way to go---and it's on her list of things to do, if I understand correctly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

7 participants