I’ve not read this yet, just passing it along, as it looks really interesting.

I’m not affiliated in any way with this.

ETA: If anyone has read it / bought a copy, a review would be very appreciated.

  • Adam Monsen@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    4 days ago

    Hi! Author here. I added a http → https redirect to my book website, thanks all. I do intend to always serve public content via https to (as other smart folks have thoughtfully mentioned) guard against stuff getting messed with between my server and your browser (however unlikely that may be). In this case I thought my server was redirecting to https, but turns out my Firefox was forcing https (again, same as other smart folks said).

    re: “expert”, ugh, I’m embarrassed to even use that word, but someone else graciously called me that (so I intended to remove “self-proclaimed”), and it supposedly helps for sales. All I know is I’m growing and learning just like you, the more I know the less I know I know, and I make mistakes all the time. I always appreciate kind corrections/feedback/comments/patches/suggestions/etc.

    That includes feedback on https://github.com/meonkeys/shb/blob/main/pelican/website/content/extra/.htaccess … I feel clever fixing two things in a single redirect (getting rid of www. and forcing https), but I’m not sure if I’m doing something silly or dangerous here. I’m definitely not an expert at Apache mod_rewrite, I just cobbled that together from official docs and stackoverflow posts.

    • perishthethought@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 days ago

      Hi author! I’m Dad. :)

      Thanks for joining the conversation. I thought it too much to hope you’d be on Lemmy but glad you are! Thanks for adding those bits about https, but I was saddened to see that 90% of the conversation around this centered on that one side topic.

      I’ve only read the TOC for your book so far but it seems very much what we need to see more people adopt self-hosting so thank you very much for putting in the time and effort!

    • perishthethought@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      11 days ago

      They do, via Traefik. Chapter 8.

      Maybe they decided there was nothing that requires an SSL/TLS certificate on this particular site? (They accept payments elsewhere).

    • ilmagico@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      11 days ago

      The site does use https for me… it instantly redirects from http to https

      • witten@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        5 days ago

        The site links to a site that accepts payment data. So because the author’s site is http, a MITM attacker could change the payment links from lulu.com to site-that-actually-steals-your-credit-card.com.

        That’s one huge thing https provides over http… assurance of unadulterated content, including links to sites that actually deal in sensitive data.

      • Encrypt-Keeper@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        11 days ago

        The site is encrypted but you can also access the site over http. The author hasn’t configured any kind of HTTPS upgrade. This is an easily correctable oversight that a self proclaimed “self hosting expert” should have accounted for.

      • Saik0@lemmy.saik0.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 days ago

        Why would the lack of SSL concern you?

        Because it means my traffic to that site is in the clear. And while we’re not transacting anything sensitive necessarily. It’s still best practice to limit sniffing.

        Automatically swapping to https should be default behavior for every website.

        • AlexanderESmith@social.alexanderesmith.com
          link
          fedilink
          arrow-up
          2
          arrow-down
          5
          ·
          11 days ago

          There’s no need to encrypt this data. Any entity that is watching you knows how to see the domains you visit, and everything on this site is on the main page, or a click away from it.

          An SSL here is nothing more than security theater, or marketing.

          • Saik0@lemmy.saik0.com
            link
            fedilink
            English
            arrow-up
            5
            ·
            11 days ago

            An SSL here is nothing more than security theater, or marketing.

            Or like I already said… is best practice.

            • AlexanderESmith@social.alexanderesmith.com
              link
              fedilink
              arrow-up
              3
              arrow-down
              4
              ·
              11 days ago

              “Best practice” isn’t a catch-all rebuttal. Best practices are contextual. I’m keen to see your justification for encryption beyond “all sites should encrypt everything always”.

              My assertion is that this isn’t necessary in this case. Why do you think that it is necessary to encrypt open-source, freely available, non-controversial site content?

              • Saik0@lemmy.saik0.com
                link
                fedilink
                English
                arrow-up
                7
                ·
                edit-2
                11 days ago

                The site is already available in HTTPS. Why would you even serve content non-encrypted?

                If you need an education on the matter… Here you go. https://www.cloudflare.com/learning/ssl/why-use-https/

                “I don’t handle sensitive information on my website so I don’t need HTTPS”

                A common reason websites don’t implement security is because they think it’s overkill for their purposes. After all, if you’re not dealing with sensitive data, who cares if someone is snooping? There are a few reasons that this is an overly simplistic view on web security. For example, some Internet service providers will actually inject advertising into HTTP-served websites. These ads may or may not be in line with the content of the website, and can potentially be offensive, aside from the fact that the website provider has no creative input or share of the revenue. These injected ads are no longer feasible once a site is secured.
                Modern web browsers now limit functionality for sites that are not secure. Important features that improve the quality of the website now require HTTPS. Geolocation, push notifications and the service workers needed to run progressive web applications (PWAs) all require heightened security. This makes sense; data such as a user’s location is sensitive and can be used for nefarious purposes.

                I don’t feel the need to be your teacher. You can easily google why you should always be using HTTPS. There’s numerous reason… all overwhelmingly obvious. Forget the basic “Not every ISP is an angel, and they all will collect as much information as they can get”. But I already said that… “It’s still best practice to limit sniffing.” Not sure why I need to elaborate any more on that. Very much akin to “why close your window blinds”, because nobody likes a peeping tom.

                Ultimately for this specific website it’s literally changing a couple lines of code in their apache or nginx instance (or whatever proxy they’re using). It’s called best practice for a reason.

                Edit: Hell it’s even a bit more of a guarantee that your site makes it to the consumer unaltered. Would be odd for that site to have it’s packets intercepted and midget porn be added to every page wouldn’t it? Think that would hurt the guys reputation?

          • lemmyvore
            link
            fedilink
            English
            arrow-up
            1
            ·
            10 days ago

            If someone was really hijacking your connection to that http site you’d never know it. They’d redirect you to a website that looks identical and even has SSL, but it’s modified in a subtle way. Like asking you to donate or buy something for example, or maybe login with your Google account, maybe run some malware, sky’s the limit.

            The problem with plain http is that they can do this without having to compromise the original website. They just have to be somewhere between you and the website, like a convenient wifi access point.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 days ago

        Why wouldn’t that concern you? That means it is totally plain text with zero verification of incoming data or encryption. It is really easy to tamper with http traffic.

      • lemmyvore
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 days ago

        Without TLS you don’t know if you’re getting the real site content or if somebody somewhere, in the many hops between your computer and the website server, is sending you fake content.

  • Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    2
    ·
    edit-2
    4 days ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    HTTPS HTTP over SSL
    SSL Secure Sockets Layer, for transparent encryption
    TLS Transport Layer Security, supersedes SSL
    nginx Popular HTTP server

    [Thread #812 for this sub, first seen 16th Jun 2024, 20:05] [FAQ] [Full list] [Contact] [Source code]