Attila Bukor has posted comments on this change. ( 
http://gerrit.cloudera.org:8080/11162 )

Change subject: [site] Add http to https redirect
......................................................................


Patch Set 1:

> Patch Set 1: Code-Review-1
>
> I know I was the one that suggested this approach, however after doing more 
> research I think it's the wrong way to do it. There is a good article by 
> Google about how to enable HTTPS @ 
> https://developers.google.com/web/fundamentals/security/encrypt-in-transit/enable-https
>
> In the section of that article titled "Turn on Strict Transport Security and 
> secure cookies" they recommend using HSTS 
> <https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security> instead of a 
> 301 redirect, and in the section "Redirect HTTP to HTTPS" they recommend 
> using <link rel="canonical" href="https://...";> tags in the page header to 
> gently redirect search engines to using https.

The HSTS approach is definitely something I'd like to look into, but as it's 
something that's hard to go back once enabled (we need to wait until max-age 
secnods), I thought this should be added as a next step once we are reasonably 
certain it's working fine for everyone (we can ask around on Slack and the 
mailing lists maybe).

As for the canonical link approach, it's nice to have for search engines, but 
it doesn't actually redirect, so 301 still should be used here. The Google 
article you linked seems inconsistent about this point too, maybe it has been 
updated at some point, but they failed to update all references:

"This defeats attacks such as SSL Stripping, and also avoids the round-trip 
cost of the 301 redirect that we enabled in Redirect HTTP to HTTPS." <- it 
talks about 301 redirect instead of the canonical link tag.

The HSTS RFC itself says a permanent redirect such as response code 301 SHOULD 
be used when the request is made over a non-secure HTTP transport[1]. It also 
says the STS header MUST NOT be included on such requests, only on HTTPS.

>
> Sending a hard 301 redirect from http seems undesirable because it locks out 
> clients that can't speak https, whereas the above approaches are both 
> backward-and forward-compatible.

You're right that it might lock out some clients with the current settings. 
According to Qualys SSL Labs tests, there's a protocol mismatch with IE 10 and 
earlier, Android 4.3 and earlier, and Safari 6.0.4 and earlier[2]. Do we have 
any data on whether we have any visitors using any of these browsers? I'd 
assume it would be near impossible to use any modern websites with them, so I'm 
not sure whether we need to take them into consideration. I imagine enabling 
old cipher suites/protocols they understand would result in a very low grade on 
this report.

Anyway, if we want to make kudu.apache.org accessible on these old browsers, I 
believe TLS 1.0, and RSA with 3DES should be enabled instead of allowing 
everyone else to access the page over non-secure HTTP.

[1] https://tools.ietf.org/html/rfc6797#section-7.2
[2] 
https://www.ssllabs.com/ssltest/analyze.html?d=kudu.apache.org&s=40.79.78.1&latest


--
To view, visit http://gerrit.cloudera.org:8080/11162
To unsubscribe, visit http://gerrit.cloudera.org:8080/settings

Gerrit-Project: kudu
Gerrit-Branch: gh-pages
Gerrit-MessageType: comment
Gerrit-Change-Id: Ic5a060a419466ec4b16840347d387262ca8a4199
Gerrit-Change-Number: 11162
Gerrit-PatchSet: 1
Gerrit-Owner: Attila Bukor <[email protected]>
Gerrit-Reviewer: Attila Bukor <[email protected]>
Gerrit-Reviewer: Dan Burkert <[email protected]>
Gerrit-Reviewer: Mike Percy <[email protected]>
Gerrit-Reviewer: Todd Lipcon <[email protected]>
Gerrit-Comment-Date: Mon, 13 Aug 2018 09:43:01 +0000
Gerrit-HasComments: No

Reply via email to