Erik van Straten<p>Why https instead of http?</p><p>Two reasons, most important first:</p><p>(1) The server is authenticated;</p><p>(2) The connection between the browser and the server is encrypted and checked for changes to the data exchanged.</p><p>Why is (1) most important? Because, with https, you can be reasonably sure that your browser has an impenetrable and unreadable (exchanged bytes are readable, but they make no sense because the data is encrypted) E2EE {1} connection with a server of which the DN (domain name {2}) is shown in the address bar of your browser {3}.</p><p>And *that* is most important, because if you don't want to exchange data with cybercriminals, the *first* thing to do is to make sure that the server your browser is connected to, is not *owned* by cybercriminals or anyone who wants to misinform you. Therefore, server-authentication comes first.</p><p>Why is (2) important? Once you're sure that (1) is okay, you don't want anyone to be able to sniff (read unencrypted data) from the connection, remove part of or change the exchanged data (on the fly), or redirect/hijack the connection to another server; https prevents all of this. Note that this protection is limited to the connection between the two E2EE endpoints only!</p><p>{1} E2EE: End to End Encrypted - in such a way that AitM {4} attacks are virtually impossible.</p><p>{2} DN = Domain name, simplified: a human readable, worldwide unique, alias of the IP-address of a server. Examples: "infosec.exchange", "www.google.com". Although *valid* DN's may consist only of a combination of:<br>• characters 'a' .. 'z' (lowercase only)<br>• character '-' (minus)<br>• subdomain separator char '.' (dot)<br>a lot of confusion is caused by, among other things, IDN's (International Domain Names) and apparent DN's that include a user-ID (and optionally a password), such as in "user:pw@DN" or "user@DN" which can be misleading, like in "https:⁄⁄microsoft.com@phishme.co".<br>See <a href="https://en.wikipedia.org/wiki/Domain_name" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Domain_n</span><span class="invisible">ame</span></a> for more info.</p><p>{3} Most important preconditions: you did not see any certificate warnings or errors, no Certificate Services Provider (trusted by your browser) has submitted an illegal certificate to the server, the server's private key is not compromised, you've not installed an untrustworthy root certificate on your device and none of your device's OS, browser and plug-ins are compromised.</p><p>{4} AitM or MitM: Attacker/Man in the Middle. Unless a server's private key is compromised, it is virtually impossible for an external attacker to intercept, redirect, or break open a server-authenticated https (E2EE {1}) connection.</p><p>————————<br>| WARNINGS |<br>————————</p><p>*YOUR* problems UNSOLVED by https:</p><p>(a) You'll have to make sure that YOUR endpoint of the https connection is trustworthy (e.g. you've not accidentally installed AitM {4} malware or software such as AnyDesk), and you don't let an untrustworthy person use your device. Also see the end of {3}.</p><p>(b) Even if some Certificate Authorities advertise "secure site" nonsense, https has exacly *NOTHING* to do with the trustwortyness of websites, their owners or anyone who has (or illegally obtains) access to a (https) server endpoint - or whatever lays behind that.</p><p>(c) You'll have to somehow figure out who *right now* owns the DN shown in the address bar of your browser. That may be impossible if a DN ends in, for example, "pages.dev", ".dns-dynamic.net" or "my.id" (.id is for Indonesia).</p><p>(d) Next, somehow you'll have to figure out how *trustworthy* that owner is (BTW, in offline life this is exactly the same). Usually that is an assumption based on reputation. How reliable is that person or organization? How well do they protect their server(s)? Will they sell and/or share your data to other parties? Do they help you if you lose access to your account? How trustworthy are any hosters or CDN's that ar being used, such as Amazon, Cloudflare and Fastly {5}?</p><p>{5} W.r.t. Fastly, for example, check the 100 DN's below "X509v3 Subject Alternative Name:" in <a href="https://crt.sh/?id=13044029379" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">crt.sh/?id=13044029379</span><span class="invisible"></span></a>)? Note that Fastly reuses a few public keys in *many* certificates like that one. The server endpoint of your https connection may be one of *many* Fastly servers, *NOT* the the actual server that you've been made to believe that your browser is connected to. You have no idea how secure anything is between Fastly's proxy server(s) and the *actual* server.</p><p><a href="https://infosec.exchange/tags/Padlock" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Padlock</span></a> <a href="https://infosec.exchange/tags/http" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>http</span></a> <a href="https://infosec.exchange/tags/https" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>https</span></a> <a href="https://infosec.exchange/tags/httpvshttps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpvshttps</span></a> <a href="https://infosec.exchange/tags/httpsvshttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpsvshttp</span></a> <a href="https://infosec.exchange/tags/TLS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TLS</span></a> <a href="https://infosec.exchange/tags/ServerAuthentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ServerAuthentication</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Authentication</span></a> <a href="https://infosec.exchange/tags/Impersonation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Impersonation</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Trust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trust</span></a> <a href="https://infosec.exchange/tags/Trustworthy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trustworthy</span></a> <a href="https://infosec.exchange/tags/Trustworthyness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trustworthyness</span></a> <a href="https://infosec.exchange/tags/CDN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CDN</span></a> <a href="https://infosec.exchange/tags/Amazon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Amazon</span></a> <a href="https://infosec.exchange/tags/Cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloud</span></a> <a href="https://infosec.exchange/tags/Cloudservices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cloudservices</span></a> <a href="https://infosec.exchange/tags/Hosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosting</span></a> <a href="https://infosec.exchange/tags/Hosters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hosters</span></a> <a href="https://infosec.exchange/tags/CloudFlare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CloudFlare</span></a> <a href="https://infosec.exchange/tags/Fastly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fastly</span></a></p>