#22028: jow added a png file to openwrt.org that breaks propper https!
-----------------------+-------------------
 Reporter:  anonymous  |      Owner:
     Type:  defect     |     Status:  new
 Priority:  high       |  Milestone:
Component:  website    |    Version:  Trunk
 Keywords:             |
-----------------------+-------------------
 Jow, thanks for the information about the battlemesh in portugal, but
 could you please upload the png file to a propper https working server or
 update the certificate of your server ant then the link?
 You server certificate expired on 04.10.2013 11:11! Yes, 2013!! We have
 now in 2016 free and great certificates from letsencrypt. Please use them
 if you would like a automated system of updating your certificate so that
 you dont have to care more about that.

 The link how it should look like on openwrt.org:
 https://luci.subsignal.org/~jow/battlemesh-v9-poster-web.png

 how it looks now and gives warnings in modern browsers:
 http://luci.subsignal.org/~jow/battlemesh-v9-poster-web.png

 By the way, your server is totaly broken from the security side:
 https://www.ssllabs.com/ssltest/analyze.html?d=luci.subsignal.org&latest

 Some notes:
 This server is vulnerable to the POODLE attack. (BAD!)
 This server supports weak Diffie-Hellman (DH) key exchange parameters
 (BAD!)
 Certificate uses a weak signature (BAD!)
 The server does not support Forward Secrecy (BAD!)

 You seem to use ubuntu 14.04 on your server. Fixing those things should be
 easy.

 Greetings

--
Ticket URL: <https://dev.openwrt.org/ticket/22028>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to