Il giorno 19/feb/2013, alle ore 14:43, Donald Stufft <donald.stu...@gmail.com> 
ha scritto:

> On Tuesday, February 19, 2013 at 8:35 AM, Giovanni Bajo wrote:
>> We have two different kind of users:
>> 1) Browsers
>> 2) Tools
>> 
>> For browsers, yes, redirect would be useful. For tools, not so much (in 
>> fact, it can give false security feeling).  This is also why I was proposing 
>> to apply for Chromium and Mozilla whitelists once HSTS is properly deployed 
>> (max-age > 6 months is needed to apply).
>> 
>> I would be OK with redirecting for browsers (matching the user agent for 
>> instance), but I would try to disable for tools as much as possible. 
> The redirect only occurs on GET/HEAD, either the tools are using POST and 
> won't be affected,
> or they're using GET and the stdlib should handle the redirect automatically. 
> Even without verification
> of a SSL cert you still get some protection from passive attacks.

Passwords are transmitted in POST that don't get redirected. What kind of 
passive attacks are you thinking of? 

> I also reject the idea that it will give a false security feeling as most 
> people won't
> even realize they are being redirected to SSL in a tool.

I'm thinking of installation tools that print the current URL on the console, 
like pip and easy_install do.
-- 
Giovanni Bajo   ::  ra...@develer.com
Develer S.r.l.  ::  http://www.develer.com

My Blog: http://giovanni.bajo.it





Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Catalog-SIG mailing list
Catalog-SIG@python.org
http://mail.python.org/mailman/listinfo/catalog-sig

Reply via email to