Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Drop support for weak cipher suites for TLS 1.2 on permission.site #93

Open
Kenneth-Barber opened this issue Feb 1, 2022 · 2 comments

Comments

@Kenneth-Barber
Copy link

Even though permission.site gives you the option to connect using HTTP instead of HTTPS, I still feel that it is important for HTTPS to be implemented securely. Please drop support for weak cipher suites for TLS 1.2. See the link below for more details:
https://www.ssllabs.com/ssltest/analyze.html?d=permission.site

@lgarron
Copy link
Collaborator

lgarron commented Feb 5, 2022

permission.site is intended to be used across a wide variety of browsers.

Given that serious security concerns like downgrade attacks are well mitigated in browsers, I'd argue that compatibility with more cipher suites is more useful than the alternative.

In any case, this project uses GitHub Pages for hosting, and that does not allow this level of configuration.
(Alternative hosting would raise barriers to maintenance and contribution.)

@Kenneth-Barber
Copy link
Author

I would argue that browsers have good support for cipher suites, so security is more important.

Where can I leave this type of feedback for GitHub Pages?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants