Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-08-20 Thread Mouse
> My grudge against HTTPS, for example, is that just looking through an
> average certificate store is an enourmous set of public keys - and it
> would seem to be impossible to keep up with who actually owns the
> private counterparts of these.  And it only takes one to be
> compromised to throw everyone's HTTPS verifications off.

Quite so.  I would be astonished if none had leaked.

But then, the whole security model was compromised the first time a
TLD-wildcard cert was issued (such as is used for "captive portal"
interposers by airlines for their in-flight wifi and the like) - or, if
you prefer, when support for them was implemented.

> But maybe one day HTTPS will be more robust, safe.

Well...maybe something derived from it will be - though I have my
doubts - but, if so, I think it won't be much like HTTPS any longer.

> Personally I think physically going to a business and being given a
> copy of their key would be good... a mix of old and new.

Yes.  Throw out the whole CA-chain model; it's fundamentally broken, by
wildcards, by lack of transparency of the root-CA list, and by being
run by businesses and therefore having (from users' point of view)
perverse incentives.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-08-20 Thread vines



> > > manipulating connections, blocking connections that are deemed
> > > "unwanted / illegal / etc.", and spying on user agents.  
> > 
> > That's all very well, and I'm glad it's available.  My beef is with
> > webservers imposing it on clients, rather than letting clients choose.
> 
> The idea is that if the webserver does not impose it the client will not
> get the choice because of the gov./etc., thus the choice is imposed on all
> for those whose clients would not get the choice.
> 
> It is a trade off.
> 


A little late, but, something I wanted to post here:

Apparently, according to https://www.howsmyssl.com my distribution of Lynx is
supporting weak cipher suites, and that is the only problem with Lynx's TLS.
'3DES vulnerable to sweet32'
I think this is something that can be fixed upstream?
Assuming the opinions of howsmyssl.com on cipher suites are credible.




Yes, I would conclude HTTPS is one big trade-off, with obvious flaws.

My grudge against HTTPS, for example, is that just looking through an average
certificate store is an enourmous set of public keys - and it would seem to be
impossible to keep up with who actually owns the private counterparts of these.
And it only takes one to be compromised to throw everyone's HTTPS verifications
off.

So I try to think of HTTPS as a 'public beta' - consumers have only just moved
to the internet for everything over the past 10 years, and there are various
developments that need to happen to it. I too dislike the power of Google, but
they are introducing a new security header named 'Expect-CT' which _might_ solve
the thing I most dislike about HTTPS. It should be easier to implement than
HKPK. But at present the 'Secure' and 'NotSecure' notices in Chromium/Chrome are
just oversimplified humour!

But maybe one day HTTPS will be more robust, safe.

Personally I think physically going to a business and being given a copy of 
their
key would be good... a mix of old and new.





___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-29 Thread Halaasz Saandor

2018/07/24 04:14 ... David Woolley:
In particular, having a non-HTTPS site will result in appearing a long 
way down the Google search results.


I try'd that with a Google-search for something local to me, "toledo 
lucas public library" and did not see that effect, but saw something 
doubtless most of you know, that every link in the answer points to 
Google. (I usually use Duckduckgo.)


___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-29 Thread Thorsten Glaser
Mouse dixit:

>Because there is no technical difference between that and a cert for
>*.com or *.qc.ca: there is no way to tell, when presented with the
>cert, whether everything covered by it is under common administration.

Except the asterisk does not match a dot.

So *.com would be valid for example.com but not www.example.com.

CAs are a critical failure point anyway… I recall posting to this
list a suggestion that lynx could remember server certificates,
what others, a decade or so later, now call HPKP IIRC.

bye,
//mirabilos
-- 
Stéphane, I actually don’t block Googlemail, they’re just too utterly
stupid to successfully deliver to me (or anyone else using Greylisting
and not whitelisting their ranges). Same for a few other providers such
as Hotmail. Some spammers (Yahoo) I do block.

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-29 Thread Mouse
>>> protection from the NSA and other governments and companies
>> _That_ protection was blown when the first wildcard cert was issued
> If I own example.com and I get a cert for *.example.com how is that
> insecure?

Because there is no technical difference between that and a cert for
*.com or *.qc.ca: there is no way to tell, when presented with the
cert, whether everything covered by it is under common administration.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-29 Thread David Niklas
On Sat, 28 Jul 2018 11:53:59 -0400 (EDT)
Mouse  wrote:
> >>> [...] webservers that refuse to serve anything over HTTP except a
> >>> redirect to HTTPS.  
> >> They are just following an industry trend orchestrated by Google.
> >> [...]
> >> It's difficult to get a good explanation for the policy, [...]  
> > The reason that https is being mandated is so that everyone has
> > protection from the NSA and other governments and companies  
> 
> _That_ protection was blown when the first wildcard cert was issued -
> or, if you think of it another way, when support for wildcard certs was
> implemented.


If I own example.com and I get a cert for *.example.com how is that
insecure?
I've read things like what you've wrote above before and there is always
that little detail missing...

> > manipulating connections, blocking connections that are deemed
> > "unwanted / illegal / etc.", and spying on user agents.  
> 
> That's all very well, and I'm glad it's available.  My beef is with
> webservers imposing it on clients, rather than letting clients choose.

The idea is that if the webserver does not impose it the client will not
get the choice because of the gov./etc., thus the choice is imposed on all
for those whose clients would not get the choice.

It is a trade off.

"The needs of the few outweigh the needs of the many." -- Star Trek, when
Spock's logic got reversed to justify saving his life.

Sincerely,
David

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Thorsten Glaser
David Woolley dixit:

> Because the request URI hasn't been sent at the time that the 
> appropriate certificate for the host needs to be selected.  It is only 
> sent after encryption is established, based on that host name.

Yes, but I showed no less than three ways to deal with that
problem in a less privacy-reducing way.

And *forcing* clients to use SNI instead of merely accepting
it is way out of proportions.

> Although the average web consumer doesn't seem to understand it, knowing 

Note that there’s more to the internet than the web, by the way.

> Even without the host being in clear text, there are quite a lot of side 
> channels that could be used to make a good guess as to which page on an 
> a server is actually being accessed, in particular checking the length 
> of the response.

That may be so, but there are counter-measures for those,
especially if the sheer amount of available pages makes
that untenable.

The existence of other side channels is no excuse to not
plug this one, or rather, to open it in the first place.
And yes, I see this pretty absolutely.

bye,
//mirabilos
-- 
Yes, I hate users and I want them to suffer.
-- Marco d'Itri on gmane.linux.debian.devel.general

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread David Woolley

On 28/07/18 23:39, Travis Siegel wrote:
I thought the whole reason httpd 1.1 was produced was specifically for 
this reason.  Why do they need multiple methods of producing the same 
result, especially when one breaks existing standards?


Because the request URI hasn't been sent at the time that the 
appropriate certificate for the host needs to be selected.  It is only 
sent after encryption is established, based on that host name.


Although the average web consumer doesn't seem to understand it, knowing 
that you are talking to the intended host is critical to secure sockets 
being truly secure.  Without that, you are vulnerable to a man in the 
middle attack.


Even without the host being in clear text, there are quite a lot of side 
channels that could be used to make a good guess as to which page on an 
a server is actually being accessed, in particular checking the length 
of the response.



___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Travis Siegel
I thought the whole reason httpd 1.1 was produced was specifically for 
this reason.  Why do they need multiple methods of producing the same 
result, especially when one breaks existing standards?



On Sat, 28 Jul 2018, Mouse wrote:


SNI basically transmits the actual vhost you wish to visit, in URL
terms the part between https:// and the first slash after that, [...]
[...]
Then, the people [...] thought it would be good to create TLSv1.3
[...] and decided to add SNI to that standard; not only that, but
they *require* it to be used now.


So, TLS 1.3 is not usable for securing anything except the Web?  (That
is, if you aren't "visit"ing a "vhost"?)

/~\ The ASCII Mouse
\ / Ribbon Campaign
X  Against HTML mo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev



___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Steffen Nurpmeso
Mouse wrote in <201807281950.paa01...@stone.rodents-montreal.org>:
 |> SNI basically transmits the actual vhost you wish to visit, in URL
 |> terms the part between https:// and the first slash after that, [...]
 |> [...]
 |> Then, the people [...] thought it would be good to create TLSv1.3
 |> [...] and decided to add SNI to that standard; not only that, but
 |> they *require* it to be used now.
 |
 |So, TLS 1.3 is not usable for securing anything except the Web?  (That
 |is, if you aren't "visit"ing a "vhost"?)

For example RFC 7672[1], 8.1. "SNI Support"

   To ensure that the server sends the right certificate chain, the SMTP
   client MUST send the TLS SNI extension containing the TLSA base
   domain.  This precludes the use of the Secure Socket Layer (SSL)
   HELLO that is SSL 2.0 compatible by the SMTP client.

   Each SMTP server MUST present a certificate chain (see [RFC5246],
   Section 7.4.2) that matches at least one of the TLSA records.  The
   server MAY rely on SNI to determine which certificate chain to
   present to the client.  Clients that don't send SNI information may
   not see the expected certificate chain.

  [1] https://tools.ietf.org/rfc/rfc7672.txt

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Mouse
> SNI basically transmits the actual vhost you wish to visit, in URL
> terms the part between https:// and the first slash after that, [...]
> [...]
> Then, the people [...] thought it would be good to create TLSv1.3
> [...] and decided to add SNI to that standard; not only that, but
> they *require* it to be used now.

So, TLS 1.3 is not usable for securing anything except the Web?  (That
is, if you aren't "visit"ing a "vhost"?)

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Thorsten Glaser
David Niklas dixit:

>All that being said, I'd be interested in knowing what Thorsten Glaser
>was talking about with respect to TLS 1.3. I though, perhaps somewhat
>naively, that all headers, cookies, and the resource(s) you are

That used to be true.

Then, people who wanted to host multiple sites on one physical
server started to listen to Apache webserver warnings that
“having multiple vhosts on one SSL port does not work” (when
it works very well, if you have a wildcard or multi-sAN cert)
and decided to create an extension to SSL/TLS, called SNI
(server name indication), which made its way into OpenSSL 0.9.8
and up.

SNI basically transmits the actual vhost you wish to visit,
in URL terms the part between https:// and the first slash
after that, in plaintext to the server BEFORE SSL is established
so the server can choose the “correct” certificate for that domain.

This is all to silence webserver and webbrowser warnings, when
a number of different ways would have worked too:

• for site1.example.com and site2.example.com, use a wildcard
  certificate for *.example.com instead

• for site1.example.com and site2.example.org, use a multi-sAN
  certificate instead which has subjectAltName contain both
  DNS:site1.example.com and DNS:site2.example.org attributes

• or just use IPv6 and have site1 use IP address 2001:db8::1
  and site2 use 2001:db8::2, so you don’t even need vhosts at all

This extension was optional for a long time, but more and more
sites have started implementing it, including, unfortunately,
community-driven projects such as Debian, citing it being a
“standard”. (It’s probably been in some RFC.)

After some time, we arrived at TLSv1.2 (OpenSSL 1.x) being
in widespread use, more cryptographic problems showing up
and being solved (incidentally most of them only applying
to stuff wildly added to OpenSSL 0.9.8 while those of us
who stuck with 0.9.7 were unaffected by most of them and
could backport the remaining fixes manually).

Then, the people at some green table committee thought it
would be good to create TLSv1.3 (which uses completely
different ciphersuites too and perhals would better have
been TLSv2.0) and decided to add SNI to that standard; not
only that, but they *require* it to be used now.

Instead of improving security, TLSv1.3 actually reduces privacy.

It’s not the first time a standard is idiotic (one of the mandates
of POSIX is actually illegal in Germany, for example); choosing to
not support SNI will however have a changed outlook now: before,
you could tell people to get proper wildcard/multi-sAN certificates
or IPv6 instead; now they can reject that suggestion citing SNI is
required by TLS, and just ignore one’s problem reports.

I doubt this is the only problem with TLS, and newer TLS versions
in general.

(There's also quite a bit of protocol ossification: embedded systems
like ADSL modems, routers, etc. that can’t upgrade will now be unable
to connect to those sites requiring newer TLS versions and have to
fall back to unencrypted (if at all supported) instead of using the
older TLS version that still provides sufficient security unless you
are a bank, if you disable a few problematic features and ciphersuites
and implement a few countermeasures. Nobody cares, mostly because a
conglomerate of Google and Mozilla want to force their latest adver‐
tisement-displaying-engines (aka “modern browsers”) upon you and an
easy way to do that is to make the old ones stop working.

Disillusioned greetings,
//mirabilos
-- 
“It is inappropriate to require that a time represented as
 seconds since the Epoch precisely represent the number of
 seconds between the referenced time and the Epoch.”
-- IEEE Std 1003.1b-1993 (POSIX) Section B.2.2.2

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread Mouse
>>> [...] webservers that refuse to serve anything over HTTP except a
>>> redirect to HTTPS.
>> They are just following an industry trend orchestrated by Google.
>> [...]
>> It's difficult to get a good explanation for the policy, [...]
> The reason that https is being mandated is so that everyone has
> protection from the NSA and other governments and companies

_That_ protection was blown when the first wildcard cert was issued -
or, if you think of it another way, when support for wildcard certs was
implemented.  (I'm not convinced the publicly available crypto is
secure against letter agencies even when used securely, for that
matter, but that's a separate question, and the above stands even if it
is secure.)

> manipulating connections, blocking connections that are deemed
> "unwanted / illegal / etc.", and spying on user agents.

That's all very well, and I'm glad it's available.  My beef is with
webservers imposing it on clients, rather than letting clients choose.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-28 Thread David Niklas
On Tue, 24 Jul 2018 09:14:25 +0100
David Woolley  wrote:
> On 24/07/18 01:31, Mouse wrote:
> > Actually, in my case, it's the fault of webservers that refuse to
> > serve anything over HTTP except a redirect to HTTPS.  I neither have
> > nor want HTTPS support.
> >   
> 
> They are just following an industry trend orchestrated by Google.  In 
> particular, having a non-HTTPS site will result in appearing a long way 
> down the Google search results.  Most sites are either their to sell 
> something, or to sell people to advertisers, so they want a good google 
> ranking.
> 
> Even when the contents is the primary reason for the site, hosting
> costs have to be paid, and that is often done by advertising.
> 
> It's difficult to get a good explanation for the policy, but my guess
> is that is the number of people accessing from mobile devices using
> public hot spots.

The reason that https is being mandated is so that everyone has
protection from the NSA and other governments and companies (and I have
personally, and frequently encountered all of the above, here in the US),
manipulating connections, blocking connections that are deemed
"unwanted / illegal / etc.", and spying on user agents.
"Illegal" often has nothing to do with traditional (i.e. Christian),
morality and more to do with the ruling classes desire not to face any
dissension from exterior sources.
Thus governments and companies are faced with the choice of either
blocking the whole domain or non at all.
And connection manipulation becomes impossible, but that does not stop US
companies and the government from manipulating anything that is not
encrypted.
If a site offers both http and https then the US government will actually
go as far as blocking the https version. I am referring to the
US libraries here.
This is not to mention the "sign on" pages that you encounter when you
visit any number of "open" wifi access points.

All that being said, I'd be interested in knowing what Thorsten Glaser
was talking about with respect to TLS 1.3. I though, perhaps somewhat
naively, that all headers, cookies, and the resource(s) you are
requesting are encrypted thus nothing could be leaked / manipulated / or
affected during the session. The best an adversary could do was guess
what you asked for.

Sincerely,
David

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-24 Thread Mouse
>> [...] webservers that refuse to serve anything over HTTP except a
>> redirect to HTTPS.
> They are just following an industry trend orchestrated by Google.  In
> particular, having a non-HTTPS site will result in appearing a long
> way down the Google search results.  Most sites are either their to
> sell something, or to sell people to advertisers, so they want a good
> google ranking.

Perhaps.

But some sites for which I would think Google rankings are irrelevant
are joining in, even - like CIRA, which goodness knows I'm no fan of
but for which I have trouble seeing Google ranking as outweighing their
duty to be as accessible to everyone as possible.

Perhaps what you outline is most of it, and the others are just
bandwagon-jumpers, or some such.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-24 Thread Stefan Caunter

> On Jul 24, 2018, at 04:14, David Woolley  wrote:
> 
>> On 24/07/18 01:31, Mouse wrote:
>> Actually, in my case, it's the fault of webservers that refuse to serve
>> anything over HTTP except a redirect to HTTPS.  I neither have nor want
>> HTTPS support.
> 
> They are just following an industry trend orchestrated by Google.  In 
> particular, having a non-HTTPS site will result in appearing a long way down 
> the Google search results.  Most sites are either their to sell something, or 
> to sell people to advertisers, so they want a good google ranking.
> 
> Even when the contents is the primary reason for the site, hosting costs have 
> to be paid, and that is often done by advertising.
> 
> It's difficult to get a good explanation for the policy, but my guess is that 
> is the number of people accessing from mobile devices using public hot spots.

possibly, but it is rather self serving as well 

forcing everyone to serve over https hid the referer in their search analytics 
product - this was formerly freely available for inspection 

it is not hidden from them of course, and they will happily sell you access to 
that data, for a high price 

there is much irony to be enjoyed as we realize that their data collection 
(which is ubiquitous unless you browse with lynx) occurs over “secure” 
protocols, essentially so it can be packaged up and sold as a premium feature 
in their products 

—stef

http://smashgods.ca
___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-24 Thread David Woolley

On 24/07/18 01:31, Mouse wrote:

Actually, in my case, it's the fault of webservers that refuse to serve
anything over HTTP except a redirect to HTTPS.  I neither have nor want
HTTPS support.



They are just following an industry trend orchestrated by Google.  In 
particular, having a non-HTTPS site will result in appearing a long way 
down the Google search results.  Most sites are either their to sell 
something, or to sell people to advertisers, so they want a good google 
ranking.


Even when the contents is the primary reason for the site, hosting costs 
have to be paid, and that is often done by advertising.


It's difficult to get a good explanation for the policy, but my guess is 
that is the number of people accessing from mobile devices using public 
hot spots.


___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-24 Thread Larry Hynes
Thorsten Glaser  wrote:
> Mouse dixit:
> 
> >> go to for my work and it gets worse daily.
> >
> >Me too, but it's not lynx's fault in my case.
> 
> If it’s “getting worse daily” I suspect it’s the fault of all those
> sites and CDNs now requiring TLSv1.1 or TLSv1.2 or an ECC ciphersuite.
> I am hit hard by those as well.
> 
> There’s likely no way out except upgrading to LibreSSL or something.
> But that’s an OS-wide issue, nothing lynx can help you with.

Indeed - we got this sorted out 'off list' by upgrading the version
of openssl and building lynx against that.

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Mouse
>>> [...] go to for my work and it gets worse daily.
>> Me too, but it's not lynx's fault in my case.
> If itâ??s â??getting worse dailyâ?? I suspect itâ??s the fault of all
> those sites and CDNs now requiring TLSv1.1 or TLSv1.2 or an ECC
> ciphersuite.  I am hit hard by those as well.

Actually, in my case, it's the fault of webservers that refuse to serve
anything over HTTP except a redirect to HTTPS.  I neither have nor want
HTTPS support.

> Thereâ??s likely no way out except upgrading to LibreSSL or
> something.  But thatâ??s an OS-wide issue, nothing lynx can help you
> with.

If lynx can't build with TLS support other than the underlying OS's, I
respectfully submit that its build procedure is broken. :-)

> I admit having been a proponent of using HTTPS everywhere for quite
> some time,

[Mini-rant alert.]

That's not an unreasonable choice for clients.  But for servers?
Because there is no way to negotiate, to arranve that clients that are
willing to switch to HTTPS do so and clients that aren't don't, I think
it is unreasonable for servers to insist on it.  (In general.  There
certainly are things for which it's reasonable.)

I do nothing at all on the Web for which HTTPS is appropriate or even
helpful; why should I have to pay the CPU cycle and exposed attack
surface costs of HTTPS support?  Yet increasingly large numbers of
webservers insist on ramming HTTPS down my throat anyway.  (Or, rather,
trying to.  Since I don't have HTTPS support, all they succeed in doing
is driving me away from their pages.)

> (so I now continue offering https but wonâ??t force people to use it,
> except on actual login pages and such and the
> confidential/user-specific data they generate).

Thank you.  Would that all web admins were that sane.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Thorsten Glaser
Mouse dixit:

>> go to for my work and it gets worse daily.
>
>Me too, but it's not lynx's fault in my case.

If it’s “getting worse daily” I suspect it’s the fault of all those
sites and CDNs now requiring TLSv1.1 or TLSv1.2 or an ECC ciphersuite.
I am hit hard by those as well.

There’s likely no way out except upgrading to LibreSSL or something.
But that’s an OS-wide issue, nothing lynx can help you with.

I admit having been a proponent of using HTTPS everywhere for quite
some time, but this nonsense (and insecurity; TLSv1.3 *mandates* SNI
which leaks the actual vhost you’re addressing to eavesdroppers just
because idiots can’t be arsed to use IPv6 instead of name-based vhosts
or shell over enough money for wildcard or multi-sAN certificates) is
more than just irritating (so I now continue offering https but won’t
force people to use it, except on actual login pages and such and the
confidential/user-specific data they generate).

>For example, I've had some failures trying to use lynx with various
>websites where all I get is a "403 Forbidden" nginx page.  I don't know
>what's wrong, but I see no reason to think it's lynx's fault.

These don’t seem to get more. They are the site administrators’
fault, although nginx seems to ship(? have shipped once?) a default
configuration that blocks “evil download bots” like lynx and GNU
wget. (Just when we thought those were a thing of the past, inci‐
dentally, this started. But then, I associate nginx with those new-
fangled “10x rockstar hipster developer” people, and _those_ are
known to repeat the mistakes of the past, ten times worse in some
cases.)

bye,
//mirabilos
-- 
21:12⎜ sogar bei opensolaris haben die von der community so
ziemlich jeden mist eingebaut │ man sollte unices nich so machen das
desktopuser zuviel intresse kriegen │ das macht die code base kaputt
21:13⎜ linux war früher auch mal besser :D

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Mouse
> Hi to any of you programmers who can please fix this!

> Using LYNX, I'm now shut out of more than 50% of websites I normally
> go to for my work and it gets worse daily.

Me too, but it's not lynx's fault in my case.

What you've said is not a useful problem report.  I'm not someone who
would be working on this, but if I were, I would be asking for
specifics like

- At least a few examples of specific URLs you see failures from
- What goes wrong (that is, what you expect and what you get)

For example, I've had some failures trying to use lynx with various
websites where all I get is a "403 Forbidden" nginx page.  I don't know
what's wrong, but I see no reason to think it's lynx's fault.

In your case, it might or might not be lynx's fault; if it's not, it
might or might not be feasible for lynx to work around the actual
problem - we don't have enough information to tell.

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Shel Talmy
Hi Larry, thanks for your rapid reply.  I forwarded your email to my tech, 
Giles Steinberg, who can supply you with the requested info.


Shel Talmy






On Mon, 23 Jul 2018, Larry Hynes wrote:


Shel Talmy  wrote:

Hi to any of you programmers who can please fix this!

Using LYNX, I'm now shut out of more than 50% of websites I normally go to
for my work and it gets worse daily.

TLS doesn't allow LYNX to logon to any of these TLS protected websites and
I'm "pleading" with you to effect a fix for LYNX ASAP.

And I'm open to recommendations for a browser in UNIX that will access the
sites I'm now shut out of.  Yes, this is desperation time, so please tell
me what I can do, as gonna assume I'm not the only one using LYNX with
this problem.


Hi

Lynx, when configured to do so, can connect to secure websites i.e.
those whose addresses begin with https://

Can you tell us, please:

- The operating system that you are running lynx on (windows, linux, apple, 
etc.)
- How you installed the version of lynx that you are running

And can you put in your message, please, the output of

lynx -version



___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Paul Gilmartin
On 2018-07-23, at 10:57:19, Shel Talmy wrote:
> 
> Using LYNX, I'm now shut out of more than 50% of websites I normally go to 
> for my work and it gets worse daily.
>  
Now you understand why "GDPR" starts with "GD".

-- gil


___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


Re: [Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Larry Hynes
Shel Talmy  wrote:
> Hi to any of you programmers who can please fix this!
> 
> Using LYNX, I'm now shut out of more than 50% of websites I normally go to 
> for my work and it gets worse daily.
> 
> TLS doesn't allow LYNX to logon to any of these TLS protected websites and 
> I'm "pleading" with you to effect a fix for LYNX ASAP.
> 
> And I'm open to recommendations for a browser in UNIX that will access the 
> sites I'm now shut out of.  Yes, this is desperation time, so please tell 
> me what I can do, as gonna assume I'm not the only one using LYNX with 
> this problem.

Hi

Lynx, when configured to do so, can connect to secure websites i.e.
those whose addresses begin with https://

Can you tell us, please:

- The operating system that you are running lynx on (windows, linux, apple, 
etc.)
- How you installed the version of lynx that you are running

And can you put in your message, please, the output of 

lynx -version

___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev


[Lynx-dev] TLS-"transport layer security" & LYNX

2018-07-23 Thread Shel Talmy

Hi to any of you programmers who can please fix this!

Using LYNX, I'm now shut out of more than 50% of websites I normally go to 
for my work and it gets worse daily.


TLS doesn't allow LYNX to logon to any of these TLS protected websites and 
I'm "pleading" with you to effect a fix for LYNX ASAP.


And I'm open to recommendations for a browser in UNIX that will access the 
sites I'm now shut out of.  Yes, this is desperation time, so please tell 
me what I can do, as gonna assume I'm not the only one using LYNX with 
this problem.


Thank you, and really hope to hear from you very soon.

Shel Talmy


___
Lynx-dev mailing list
Lynx-dev@nongnu.org
https://lists.nongnu.org/mailman/listinfo/lynx-dev