Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security IT

HTTP Strict Transport Security Becomes Internet Standard 98

angry tapir writes "A Web security policy mechanism that promises to make HTTPS-enabled websites more resilient to various types of attacks has been approved and released as an Internet standard — but despite support from some high-profile websites, adoption elsewhere is still low. HTTP Strict Transport Security (HSTS) allows websites to declare themselves accessible only over HTTPS (HTTP Secure) and was designed to prevent hackers from forcing user connections over HTTP or abusing mistakes in HTTPS implementations to compromise content integrity."
This discussion has been archived. No new comments can be posted.

HTTP Strict Transport Security Becomes Internet Standard

Comments Filter:
  • SSL (Score:5, Insightful)

    by FriendlyLurker ( 50431 ) on Friday November 23, 2012 @09:23AM (#42073253)
    Now, just gotta get SSL certificate system... secure and working.
  • by Skapare ( 16644 ) on Friday November 23, 2012 @10:29AM (#42073681) Homepage

    This simple logic that when any SECURE page is requested then EVERYTHING must be accessed in secure mode (valid certificate required of every part if the main requested page has a valid certificate) should have been in there right from the beginning. So many of our security problems exists because people just DON'T THINK right at the beginning AND it takes so damn fscking long for the process to fix their stupidity.

  • Re:Server Load (Score:5, Insightful)

    by lgw ( 121541 ) on Friday November 23, 2012 @02:52PM (#42075669) Journal

    HTTPS-only is a hack from a lack of foresight and breaks caching.

    What we need is a signature-only system for content that isn't private.There's no reason to encrypt the front page images on CNN to each user, but signing them so they are provably from CNN is valuable.

    More myths from the 90s - wrong on both counts. Privacy always matters. Maybe you live in a country where browing CNN won't land you in jail, but others aren't so lucky. And the only one who can't cache HTTPS traffic is the man-in-the-middle, which is sort of the point, really. Server-side there's plenty of hardware solutions to caching these days, it's just a question of where you terminate SSL. Client-side there's plenty of solutions as well, if you're running a home or office network and your users are willing to trust your cert (and thereby allow you to snoop).

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...