Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move caniuse.com to HTTPS #885

Closed
konklone opened this issue Feb 10, 2015 · 22 comments
Closed

Move caniuse.com to HTTPS #885

konklone opened this issue Feb 10, 2015 · 22 comments

Comments

@konklone
Copy link

I'd like caniuse, as a central resource to the web community, to consider moving the site to HTTPS.

The content on caniuse itself isn't very sensitive, but when viewed at large scale, all web traffic should be considered sensitive and potentially correlated with other websites in unpredictable ways. As or more importantly, ISPs like Verizon and Comcast are now routinely injecting tracking material into their customers' traffic -- using HTTPS protects visitors to caniuse from being manipulated this way.

The web community is in the middle of a big push to get the web moved over to HTTPS. Groups at the W3C, IETF, and Internet Architecture Board (IETF's sister org) have all declared that it's the web's future.

Part of getting this to happen is getting web developers to see it by the websites they visit, and to expect it of themselves. caniuse can lead by example.

One thing I didn't realize was that caniuse has an API, which means that it can inhibit sites depending caniuse from themselves moving. In #63 (comment), @mikewest said:

I keep poking folks internally about serving HTML5Rocks over HTTPS. One reason (among many) that we haven't done that yet is http://caniuse.com/jsonp.php?callback=caniusecallback, which would be blocked as mixed-content (HTTP on an HTTPS site).

As @mikewest noted in that thread, StartSSL provides free certificates, and I've written a guide to using them. However, nowadays I recommend SSLMate for easy, CLI-driven certificate issuance, though it is $16/year.

@Fyrd
Copy link
Owner

Fyrd commented Feb 21, 2015

Hi @konklone, thanks for the information and suggestion. I am indeed considering this for the site, just need some time and research to look into it properly. SSLMate looks like a good choice, thanks too for suggesting that.

One thing I should note is that that API's actually an unofficial one, I generally prefer people to use the NPM package to access the data. But that's something I should probably talk to the HTML5Rocks people with.

Thanks, I'll update this issue once I've made progress on moving to HTTPS.

@johnwalshuk
Copy link

https://letsencrypt.org/

@manigandham
Copy link

manigandham commented Aug 4, 2015

Why not just use CloudFlare? They can power the DNS, CDN caching and SSL for visitors. The free plan is plenty and I'm sure they're willing to help out if you need anything else.

@rugk
Copy link

rugk commented Aug 5, 2015

Actually if you try to access the site with HTTPS it throws me the error "ssl_error_rx_record_too_long" in Firefox. So certainly there is something wrong.
👍 for finally activating HTTPS. Either you wait until Let's Encrypt is ready or you use a cert from StartSSL or WoSign (two CAs which offer basic certs for free).

@rugk
Copy link

rugk commented Aug 5, 2015

And please no don't use Cloudflare. At least not the "Flexible SSL" version which is MITM-SSL.

@Mikaela
Copy link

Mikaela commented Oct 4, 2015

I have also seen WoSign recommended a lot.

Another issue with HTTP is documented in Codinghorror's Welcome to The Internet of Compromised things.

@Schweinepriester
Copy link
Contributor

+1000

I guess https://letsencrypt.org/ would be proper 😎

@lenovouser
Copy link

+1 for Let's Encrypt. Fits an open source project in my opinion.

@rugk
Copy link

rugk commented Oct 29, 2015

Yeah Let's Encrypt is nice. 😃

@Schweinepriester
Copy link
Contributor

Schweinepriester commented Dec 7, 2015

Let's Encrypt is now Public Beta: https://letsencrypt.org/2015/12/03/entering-public-beta.html

One could use this: https://github.com/diafygi/gethttpsforfree

@mbrevda
Copy link

mbrevda commented Sep 12, 2016

For a static site, one simple (and excellent!) option would be netlify.com. Free SSL, free cdn (for OS projects), push to build, push to deploy, and a host of other goodies.

I'm not affiliated, just a happy user.

@sideshowbarker
Copy link
Contributor

If I can help somehow with getting the site moved to HTTPS please let me know. But Let’s Encrypt is designed to make it all as easy as possible, and in my experience so far with using Let’s Encrypt to move a number of different sites to HTTPS, it pretty much “just works” and takes very little time.

@lgarron
Copy link

lgarron commented Feb 15, 2017

ping :-)

caniuse.com is a great reference, but it's very awkward to link to HTTP pages for information about browser security features like http://caniuse.com/#feat=stricttransportsecurity

I can't find any simple clues about how caniuse.com is hosted, but if there is something external contributors can do to get you to switch to HTTPS (particularly Let's Encrypt), I'd be happy to pitch in.

@Fyrd
Copy link
Owner

Fyrd commented Apr 11, 2017

IT IS DONE!

Using Let's Encrypt as per almost everyone's suggestion. Enjoy everybody!

@Fyrd Fyrd closed this as completed Apr 11, 2017
@rugk
Copy link

rugk commented Apr 11, 2017

Awesome, but you should improve your config. Last time I checked (when I could still connect) you used TLS 1.0 and some not-so-good cipher. Have a look at the Mozilla generator for a good config.
Afterwards you can check it.

@Schweinepriester
Copy link
Contributor

Schweinepriester commented Apr 11, 2017

Yeah, looking at that SSL Report (https://www.ssllabs.com/ssltest/analyze.html?d=caniuse.com) the config should definitely improved, as SSL 3 is still enabled and the POODLE attack is possible, among other things.

Sorry for being greedy, Fyrd 0:-)

EDIT: I see, you already commented: #3343 (comment)

@Fyrd
Copy link
Owner

Fyrd commented Apr 11, 2017

Sure, I'll look into this. Also apparently setting it to https by default resulted in major lag and downtime once more traffic hit the site so I guess I'll need to do a bit more investigating before I can turn that back on.

@konklone
Copy link
Author

It would help to know the implementation - in general HTTPS shouldn't introduce significant lag alone. How are you hosting/terminating?

@rugk
Copy link

rugk commented Apr 11, 2017

Also you could enable HTTP/2, which makes HTTPS faster than HTTP.

@bardiharborow
Copy link

@Fyrd https://mozilla.github.io/server-side-tls/ssl-config-generator/ may be helpful, even if you use the Intermediate or Old preset.

@rugk
Copy link

rugk commented Jul 24, 2017

But rather use the "modern" one…

@su-narthur
Copy link

Might be a good idea to open this issue again, since you've had to disable it by default.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests