SSL Encryption: Difference between revisions

new SSL CA certificate
m (Protected "SSL Encryption" [edit=sysop:move=sysop])
(new SSL CA certificate)
 
(4 intermediate revisions by 2 users not shown)
Line 2: Line 2:


  URL: https://anidb.net
  URL: https://anidb.net
*2013-06-04: new ssl certificates*
   
   
  ROOT CA: http://static.anidb.net/misc/ca.crt
  ROOT CA: https://static.anidb.net/misc/ca.crt
  SHA1 Fingerprint=42:B5:D9:B7:2A:AC:18:5F:A7:10:4C:66:A6:B2:3A:E4:3C:EF:FC:D6
  SHA1 Fingerprint=A6:5A:65:AC:DA:F4:E8:D7:4E:EC:62:C1:1F:8E:77:B9:F7:70:88:37
{{Eyecatch|Please note|


{{Eyecatch|Please note:|
All requests for images, stylesheets and other page elements are NOT encrypted. Such requests should usually not be directed towards "anidb.net" but rather towards specific subdomains (i.e. "static.anidb.net" or "imgX.anidb.net"). Requests to subdomains do not include the AniDB authentication cookies and should thus not allow attackers to hijack your AniDB session.
 
All requests for images, stylesheets and other page elements are NOT encrypted. Such requests should usually not be directed towards "anidb.net" but rather towards specific subdomains (i.e. "static.anidb.net" or "imgX.anidb.net"). Requests to subdomains do not include the anidb authentication cookies and should thus not allow attackers to hijack your anidb session.


This means that:
This means that:
Line 14: Line 15:
a) If we've accidentially hardcoded an access to http://anidb.net somewhere, this would instantly allow an attacker to obtain your session authorisation cookie.
a) If we've accidentially hardcoded an access to http://anidb.net somewhere, this would instantly allow an attacker to obtain your session authorisation cookie.


b) Attackers may be able to infer the anidb pages you're browsing on and your anidb user id by looking at the cookie and referer data sent to anidb subdomains when stylesheet and image data is loaded. For maximum security you should browse anidb with all images and stylesheets disabled.
b) Attackers may be able to infer the AniDB pages you're browsing on and your AniDB user id by looking at the cookie and referrer data sent to AniDB subdomains when stylesheet and image data is loaded. For maximum security you should browse AniDB with all images and stylesheets disabled.
Or, the recommended approach, use some VPN.}}
Or, the recommended approach, use some VPN.}}
[[Category:Features]]
MediaWiki spam blocked by CleanTalk.
MediaWiki spam blocked by CleanTalk.