Test userstyles.org over HTTPS
https://userstyles.org/
Before making HTTPS the default, I'd like to have it tested a bit more. Please try it out and let me know of any problems you encounter.
Before making HTTPS the default, I'd like to have it tested a bit more. Please try it out and let me know of any problems you encounter.
Comments
It would be better if you released an updated version of Stylish for Chrome to make the update seamless.
The JavaScript console has lots of messages like this:
I will be doing an update that makes it uses the HTTPS update URLs. This whole initiative is on pause to give time for people to upgrade Stylish due to https://github.com/JasonBarnabe/stylish-chrome/issues/9
Glad to see you have decided to support SSL/TLS. :D
Please make it more secure. ;)
Enable TLS 1.2.
Support Robust Forward Secrecy.
Enable Strict Transport Security (HSTS). (Once HTTPS is default of course)
See report @ https://www.ssllabs.com/ssltest/analyze.html?d=userstyles.org
Details on how and why to fix these issues. Should not take much time and effort to fix.
Thanks,
Will
EDIT: i just realized i had them hidden before but needed to update for https change and the new rule.
Or use:
IMG[class="ProfilePhotoMedium"][src*="https://secure.gravatar.com/avatar.php?gravatar"] {opacity: 0!important;}
IMG[class="ProfilePhotoMedium"][src*="https://secure.gravatar.com/avatar.php?gravatar"] {opacity: 0!important;}
How to select only the Default Avatar ?
I hate that googl stuff!
Forum login actually didn't work with https; I had to recompile PHP (!) to make it work.
Table View Plus (version 4.2.0 )
You need to edit it.
- Add this include:
// @include http*://userstyles.org*
- Find / Change all userstyles' http to https
- And maybe the links userscripts.org to userscripts-mirror.org (it's the script icon)
And now even worse: "This server is vulnerable to the OpenSSL CCS vulnerability (CVE-2014-0224), but probably not exploitable."
Very easy and cheap to fix these issues.
I see your running nginx/1.4.3. Why? Hope you backported the two security issues?
At the least you should be on nginx-1.4.7. Really should be on stable, which is nginx-1.6.0.
Like I said, its very easy to fix this.
See PDF @ https://bettercrypto.org/ which details settings to use in nginx. :)
Also, here on the forums it's downloading insecure content from:
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://a.ly/url/8kk': this content should also be loaded over HTTPS.
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://i.imgur.com/iy2e5.gif': this content should also be loaded over HTTPS.
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://a.ly/url/8kk': this content should also be loaded over HTTPS.
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://i.imgur.com/iy2e5.gif': this content should also be loaded over HTTPS.
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://aa.x10.mx/http://probablyprogramming.com/wp-content/uploads/2009/03/handtinyblack.gif?16394': this content should also be loaded over HTTPS.
The page at 'https://forum.userstyles.org/discussion/41197/test-userstyles-org-over-https#Item_11' was loaded over HTTPS, but displayed insecure content from 'http://probablyprogramming.com/wp-content/uploads/2009/03/handtinyblack.gif?16394': this content should also be loaded over HTTPS.
That's the problem with using https on forums. By default browser will block all user uploaded/linked content that is not https as well.
So either only allow users to link to https content or not at all. Either wise, users wont see the content by default anyways or will get the evil "partially encrypted" msgs.
Though some ssl is better than none too.. So could just live with it..
BTW Robust Forward Secrecy can be added easily enough, shows you how in that pdf I inked to prior.
Also, Strict Transport Security (HSTS) can be enabled in seconds.
Very good guide: https://www.mare-system.de/guide-to-nginx-ssl-spdy-hsts/
Could even enable SPDY support via this guide. :D