340
edits
m (Protected "SSL Encryption" [edit=sysop:move=sysop]) |
(new SSL CA certificate) |
||
(4 intermediate revisions by 2 users not shown) | |||
Line 2: | Line 2: | ||
URL: https://anidb.net | URL: https://anidb.net | ||
*2013-06-04: new ssl certificates* | |||
ROOT CA: | ROOT CA: https://static.anidb.net/misc/ca.crt | ||
SHA1 Fingerprint= | SHA1 Fingerprint=A6:5A:65:AC:DA:F4:E8:D7:4E:EC:62:C1:1F:8E:77:B9:F7:70:88:37 | ||
{{Eyecatch|Please note| | |||
All requests for images, stylesheets and other page elements are NOT encrypted. Such requests should usually not be directed towards "anidb.net" but rather towards specific subdomains (i.e. "static.anidb.net" or "imgX.anidb.net"). Requests to subdomains do not include the AniDB authentication cookies and should thus not allow attackers to hijack your AniDB session. | |||
All requests for images, stylesheets and other page elements are NOT encrypted. Such requests should usually not be directed towards "anidb.net" but rather towards specific subdomains (i.e. "static.anidb.net" or "imgX.anidb.net"). Requests to subdomains do not include the | |||
This means that: | This means that: | ||
Line 14: | Line 15: | ||
a) If we've accidentially hardcoded an access to http://anidb.net somewhere, this would instantly allow an attacker to obtain your session authorisation cookie. | a) If we've accidentially hardcoded an access to http://anidb.net somewhere, this would instantly allow an attacker to obtain your session authorisation cookie. | ||
b) Attackers may be able to infer the | b) Attackers may be able to infer the AniDB pages you're browsing on and your AniDB user id by looking at the cookie and referrer data sent to AniDB subdomains when stylesheet and image data is loaded. For maximum security you should browse AniDB with all images and stylesheets disabled. | ||
Or, the recommended approach, use some VPN.}} | Or, the recommended approach, use some VPN.}} | ||
[[Category:Features]] |