-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Draft text for HSTS communication #484
Comments
Typo: Novembeddr -> November We should also mention that we will offer an alternative for clients that doesn't support this at @rvagg lgty? |
@jbergstroem @rvagg updated based on @jbergstroem comments. Left out the part about an extension as 2022 is pretty far out anyway so I don't think softening by mentioning a possible extension helps. |
ref: #55 |
@jbergstroem @rvagg any comments or should we plan to send this out ? |
Added to WG agenda in case we don't close on it before then. |
(i have no more comments) |
Text LGTM. Perhaps when we enable this completely we can add a visible notice to the main page warning users about this (for one week perhaps?). Users that are not able to connect will probably try another computer/browser and if they can access there they will find an explanation. |
Text LGTM |
So presumably |
@gibfahn: correct. it rsyncs every N minutes (I forget) and makes it available over rsync and http. We might look at adding ipfs at some point. |
This will absolutely break anyone using an older version of nvm (luckily, a much much older version) that has the mirror pointed at the HTTP version - however, anyone who wants io.js support, or working node4+ support, has a version of nvm that points at the HTTPS URL, so I think this should be fine. Note that #233 is still open and prevents older clients from accessing iojs.org even with SSL - fixing that first would be very helpful to mitigate the impact of this change. |
Possibly - I don't really have any way of detecting that fallback reliably, so I'd have to code it to unconditionally retry the HTTP version, and I'm loath to do that. |
|
@rvagg the |
@ljharb on unencrypted.nodejs.org you mean? there's no plan to remove it from nodejs.org, we're stuck with it forever methinks |
I suppose it doesn't matter on |
@ljharb we can do /dist/ on unencrypted if it makes it easier for nvm, that's no problem, it's just an alias for /download/release/ |
|
You say "it's 2016" as if this thread isn't the first moment I've (the largest consumer of it) ever heard about deprecating "dist" |
@ljharb wasn't referring to dist, rather |
Seems like this must be close-able at this point, but by all means, comment or re-open if I'm wrong. |
Proposed Text:
Heads Up !
The goal of the Node.js build team is to deliver services/resources through channels protected
by cryptography whenever possible. As part of this effort we are planning to enable HTTP Strict
Transport Security(HSTS) on nodejs.org, iojs.org and all subdomains.
With HSTS enabled, the web sites will inform browsers that the site should never be loaded using
HTTP and any such attempts should be converted to HTTPs requests. Enabling HSTS will ensure that
all resources are delivered through a protected channel and prevents a number of man in the
middle attacks. You can read more about HSTS here.
The current plan is to do the rollout in two steps:
As an alternative for clients that can't support the new setup, we will provide unencrypted.nodejs.org and unencrypted.iojs.org as an alternative which will
support http and rsync protocols for an interim period until January 1 2022.
If you have any questions or concerns please open an issue in the build repo.
The text was updated successfully, but these errors were encountered: