-
Notifications
You must be signed in to change notification settings - Fork 278
Open
Description
Section 7.1.1. Opportunistic TLS has this:
This is a somewhat debatable feature. Such a connection would do unauthenticated TLS and wouldn't be advertized as “secure” anywhere, wouldn't use any padlock in the UI, and in fact there is no way to tell the user that it isn't plain old HTTP, but this is still opportunistic TLS and some people are very firmly against this concept.
I have to admit that I find it a bit obscure - both sides of the debate seem to agree that it's a bad thing (or so I read it). Specific issues:
- "Such a connection would do unauthenticated TLS..." how does this compare against a connection that was initiated directly with
https? - "wouldn't use any padlock in the UI" this is obscure and possibly related to browser implementations that are not necessarily the only clients?
- "there is no way to tell.." what isn't plain old HTTP exactly? The new connection where the user is being redirected to? Why would a client assume that? Why would a user?
- all the above seem to be "CONS". The "but" part also seems to be against the feature. So... does it make sense at all?
Metadata
Metadata
Assignees
Labels
No labels