(Of course I meant “HTTPS only,” not “HTTP only.”)

 

I’d love to detect an MITM, but in my experience the chances of there truly 
being an MITM attack going on are very small.

 

I tried connecting to Y! from a different location (different ISP) here in 
Shanghai, and the connection (in all 3 browsers) flipped to SSL and connected 
normally/correctly. I wonder whether Y! was redirecting me (to a bad cert) 
depending on how/where it saw me connecting from, or maybe they fixed a problem 
they were having earlier today. TBC

 

From: liberationtech [mailto:[email protected]] On 
Behalf Of Andrew Lewis
Sent: Monday, October 6, 2014 11.59
To: liberationtech
Subject: Re: [liberationtech] Y! / SSL

I am also flipping over to HTTPS, and chrome is reporting that the cert is 
valid, and upon inspection all looks as it should be. The trust chain goes up 
to a Versign root cert, so my guess is that is a bad cert you are seeing, and 
if inside china it might just be a plain old mitm.

 

 

On Oct 5, 2014, at 11:52 PM, Eric S Johnson <[email protected] 
<mailto:[email protected]> > wrote:

I just got back to CN from a vacation. I’m now (in all three main Windows 
browsers) seeing  <http://yahoo.com/> yahoo.com automatically flip over to 
HTTPS--and then give a bad cert error. The *root* cert is listed as  
<http://yahoo.com/> yahoo.com and is valid “23 Sep 14 to 23 Sep 15.”

 

Is Y! experimenting with making access to their resources always-only-HTTPS? 
Are they having certificate problems? “HTTP only” seems like a good direction 
in which to go, but teaching people to accept bad cert warnings seems like a 
bad direction in which to go.

-- 
Liberationtech is public & archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
[email protected].

Reply via email to