-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTTPS - Certificate issues on sebsauvage.net #97
Comments
@rugk I agree but let's think a bit : It depends of the level of privacy you want to acheive : no cleartext informations never touches the wire as long as no javascript is inserted by cloudflare/google analytics/ect ... ( which I made sure to disable ). All Cloudflare sees is encrypted data since they won't get the key from the url fragment either. They admitingly get your IP and date at which you posted/viewed (but they don't know what you actually posted/viewed). For the MITM part : they also have the opportunity to alter the response going to your browser, sure, but if you use an hosted service like mine or the author's one, this is actually always true, so ... no loss for you here. Feel free to host yourself without a CDN, it's the only improvement I can see to your need. Hope it helps gain some perspective. |
I think of ZeroBin as a software (which you should install on your own server and there is virtually no excuse of not doing that ;-) ) rather than a service. There are certainly some public ZeroBins out there, some of which have security issues at different levels. Please note that @sebsauvage is only active here shortly every 2-3 years here, so it is unlikely this will be changed in the forseeable future. |
@gboddin And of course the hosting provider can do the same. But you may trust your hosting provider more than Cloudflare. And obviously it's good to have not so many actors in the connection Also have a look mat the article from Scott I've already linked to (It's a good read!). He also speaks about the problem of the hosting provider:
@ulikoehler What's much more worse is that http://sebsauvage.net/paste/ does not redirect to HTTPS, so it effectively leaves all this data unprotected. All JS encryption does not help anything if you can tamper the JS to encrypt/decrypt it. Besides this the website now returns a fake certificate: Whether this connection was intercepted or it's just a misconfiguration (although this would mean @sebsauvage - or wait..., no... - Cloudflare has broken something there) - okay, no. It's obviously a traffic interception by celrec.com which seems to be near the remote Cloudflare server where this stuff get's transferred from. This started in the last minutes. |
FYI https://sebsauvage.net/paste/ still has this certificate problem... @gboddin |
Any news about the certificate issues? |
It's very bad for such a sensitive service to use the Cloudflare service. Cloudflare (free) SSL services are basically HTTPS with MITM built-in.
More information e.g. here: https://scotthelme.co.uk/cloudflares-great-new-features-and-why-i-wont-use-them/
A better way is to use own certs. And there are CAs whcih offer free certificates, so you can actually use them. E.g. StartSSL, WoSign or (when it finally launches) Let's Encrypt, which also makes it much easier to configure your server.
PS: This also applies to @gboddin's mirror which also uses Cloudflare'S SSL cert.
The text was updated successfully, but these errors were encountered: