[liberationtech] Y! / SSL
Eric S Johnson
crates at oneotaslopes.org
Sun Oct 5 23:34:17 PDT 2014
(Of course I meant “HTTPS only,” not “HTTP only.”)
I’d love to detect an MITM, but in my experience the chances of there truly being an MITM attack going on are very small.
I tried connecting to Y! from a different location (different ISP) here in Shanghai, and the connection (in all 3 browsers) flipped to SSL and connected normally/correctly. I wonder whether Y! was redirecting me (to a bad cert) depending on how/where it saw me connecting from, or maybe they fixed a problem they were having earlier today. TBC
From: liberationtech [mailto:liberationtech-bounces at lists.stanford.edu] On Behalf Of Andrew Lewis
Sent: Monday, October 6, 2014 11.59
To: liberationtech
Subject: Re: [liberationtech] Y! / SSL
I am also flipping over to HTTPS, and chrome is reporting that the cert is valid, and upon inspection all looks as it should be. The trust chain goes up to a Versign root cert, so my guess is that is a bad cert you are seeing, and if inside china it might just be a plain old mitm.
On Oct 5, 2014, at 11:52 PM, Eric S Johnson <crates at oneotaslopes.org <mailto:crates at oneotaslopes.org> > wrote:
I just got back to CN from a vacation. I’m now (in all three main Windows browsers) seeing <http://yahoo.com/> yahoo.com automatically flip over to HTTPS--and then give a bad cert error. The *root* cert is listed as <http://yahoo.com/> yahoo.com and is valid “23 Sep 14 to 23 Sep 15.”
Is Y! experimenting with making access to their resources always-only-HTTPS? Are they having certificate problems? “HTTP only” seems like a good direction in which to go, but teaching people to accept bad cert warnings seems like a bad direction in which to go.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20141006/fd36d719/attachment.html>
More information about the liberationtech
mailing list