Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security The Internet Networking IT

The Internet Archive Switches To HTTPS Connections By Default 40

An anonymous reader writes "The Internet Archive today announced it has enabled HTTPS connections by default on archive.org and openlibrary.org. The organization today also revealed it now sees over 3 million users per day. Both sites are still accessible over HTTP connections. Since the Wayback Machine is hosted on archive.org, it also follows the same rules: the secure version is used by default, but you can use the http version which will help load certain complicated webpages."
This discussion has been archived. No new comments can be posted.

The Internet Archive Switches To HTTPS Connections By Default

Comments Filter:
  • by tepples ( 727027 ) <.tepples. .at. .gmail.com.> on Friday October 25, 2013 @07:03PM (#45241481) Homepage Journal
    If Facebook [slashdot.org] and Twitter [slashdot.org] and Gmail [slashdot.org] as well as the not-for-profit Internet Archive and Wikipedia [wikimedia.org] can use HTTPS by default, why doesn't everyone [slashdot.org]? Why, for instance, does Slashdot require a paid subscription in order not to redirect HTTPS hits to HTTP, revealing the logged-in user's session ID to anyone with a Firesheep-like tool?
    • Advertisements (Score:5, Informative)

      by pavon ( 30274 ) on Friday October 25, 2013 @07:19PM (#45241611)

      The main thing holding back HTTPS is advertisements. Browsers (especially IE) complain if your encrypted page includes unencrypted content (like iframes served from a a third party ad server) and rightly so. Google can get away with it because they serve their own ads, and Wikipedia doesn't have any ads. Arstechnica ran an article [arstechnica.com] a few years back describing the reasons why they couldn't switch to HTTPS by default, but most of it boils down the fact that they can't get rid of the third party content in their pages.

      • Browsers (especially IE) complain if your encrypted page includes unencrypted content (like iframes served from a a third party ad server) and rightly so. Google can get away with it because they serve their own ads

        Then use the ads that Google serves. A month ago, Google announced HTTPS support for AdSense [blogspot.com].

        • by tlhIngan ( 30335 ) <slashdot@worf.ERDOSnet minus math_god> on Saturday October 26, 2013 @12:18AM (#45242967)

          Then use the ads that Google serves. A month ago, Google announced HTTPS support for AdSense.

          And yet, Google doesn't roll out HTTPS support for the rest of the ad companies they own? You'd think if they can do AdSense, they can do AdMob and DoubleClick and their many other ad platforms they host...

          Given Google serves like 98% of the ads on the internet (through AdSense, DoubleClick and other companies), it seems Google's the one holding HTTPS everywhere...

      • Re:Advertisements (Score:4, Insightful)

        by claar ( 126368 ) on Friday October 25, 2013 @07:59PM (#45241843)

        So get the ad companies to serve the ads over HTTPS... I don't see the big deal.

        • It raises costs, while providing them with no value [at least until sites like ars switches to https and tells them to fuck off unless they do as well]. And with online ads decreasing in value [and decreasing even faster for mobile ads], they really don't want to increase costs.

          And it's not just a one-time certificate purchase, it's a bunch more powerful servers to do this encryption and electricity to run the servers and more people to keep their cobbled together solution working with these new servers.

          • by AHuxley ( 892839 )
            Yes even with all the new easy low cost (price and power usage) cpu's for https, cheap bandwidth and less time per encrypted page its still not totally 'free in cost' for a host.
          • while providing them with no value

            The value is more visits from viewers who trust a site more because their sessions won't get hijacked.

            And it's not just a one-time certificate purchase, it's a bunch more powerful servers to do this encryption

            You mean 1% more powerful [imperialviolet.org]? On a site that isn't just a bunch of static pages, the server power needed by the web application usually outweighs the server power needed by HTTPS on the front end servers. The question becomes whether trust from users is worth this 1%.

            • Well, for ads, the percentages change. It is unlikely to be 1%, as the article refers to generating full, non-static web pages, which in general are NOT what ad services are pushing.

              They are just a small portion of the whole page, and they are generally static, so again, the cost for pushing the ad becomes significantly more than the cost for pushing the ad without SSL.

              And with ad rates going down, even for Google, adding to the cost of pushing each ad won't thrill the boss.

    • When your government regards YOU as their biggest enemy,
      and YOU should thus consider them in reverse, https is a false
      sense of security.
      Oh and btw, INTEL inside.

      • by cffrost ( 885375 ) on Friday October 25, 2013 @09:46PM (#45242381) Homepage

        When your government regards YOU as their biggest enemy,

        Yes...

        and YOU should thus consider them in reverse,

        Uh huh...

        https is a false sense of security.

        No, it's partially broken, vulnerable-to-attack security, whereas HTTP is completely vulnerable, bare-naked plaintext — nothing to break, no certs to MITM, no bribing CAs for keys — zero security.

        As bad as HTTPS may be, comparing it to HTTP in terms of security is idiotic.

        • It also does little to protect against NSA letters at the destination sites. Everybody except the government can't see what you're doing.

          For the wayback machine, this could actually be an NSA goldmine to find terrorists...or people digging up dirt on other politicians...or businesses looking things up.

  • This is nice to, say, stop Comcast from spying on the details of what you view for resale to behavioral trackers and marketers. Given the compromise of the SSL cert authorities, governmental entities can transparently man-in-the-middle the SSL session anyway so we only get part of what we'd like to achieve.
  • by manu0601 ( 2221348 ) on Friday October 25, 2013 @07:38PM (#45241715)
    HTTPS by default is nice, except for WiFi hotspots, where the authentication system intercept your first HTTP request. This cannot be done with HTTPS, which means that people with an always HTTPS home page will never auto-connect. I wonder if there will ever be a solution to that.
  • SSL strip (Moxie Marlinspike) or some suped up variant is being used for sure, the NSA has the ultimate MITM so of course they strip.

    • by Anonymous Coward

      Maybe you're lucky, but some people have more than one enemy in the world, not just the NSA.

    • by Anonymous Coward

      SSL strip (Moxie Marlinspike) or some suped up variant is being used for sure, the NSA has the ultimate MITM so of course they strip.

      Only if they have the CA. Can't strip if you can't generate new certs, and even then that is detectable.

  • HTTP that (S)queals to the NSA.
  • by gQuigs ( 913879 ) on Friday October 25, 2013 @09:00PM (#45242149) Homepage

    I browse with SSLv3 disabled... and https://archive.org/ [archive.org] only supports SSLv3... why? Most webservers have supported TLS 1.1/1.2 for ages now.. right?

    • Re:SSLv3... (Score:4, Informative)

      by Anonymous Coward on Friday October 25, 2013 @09:42PM (#45242361)

      I refreshed the page like 5 times and got a different block cipher and key exchange protocol each time, from crappy rsa-rc4 to a mighty ecdhe-aes128-gcm. Also some dhe-Camellia256 and and rsa-aes-cbc in the meantime.

      There seem to be a whole farm of servers with heterogeneous configurations back there, someone should look into it.

      While i could understand this is some "bright" new idea to mitigate the impact of one protocol being broken (not putting all eggs in the same basket), i say with confidence that AES-CBC prior to TLS1.1 and all variants of RC4 are irremediably broken. Broken like in "you can recover the plain-text in a handful of minutes using python on a 300$ netbook with only half a brain".

      • by Anonymous Coward

        all variants of RC4 are irremediably broken

        [citation needed]

        Just because RC4 _as used in WEP_ (or some other badly-designed protocol based on RC4) is insecure doesn't mean "all variants of RC4" are "irremediably broken" (whatever you mean by that).

        In fact, if you bother to look up the latest academic attacks on RC4 (published in 2013), you'll notice that they are outside the range of "a 300$ netbook", even with a "handful of minutes", since it requires the attacker to obtain 2^24 (that's more than 16 million) connections. I don't know about you, but

Keep up the good work! But please don't ask me to help.

Working...