(no title)
shishcat | 3 months ago
Proxy/CDN: HTTPS (443) → Origin server: plain HTTP (80)
(example: Cloudflare in Flexible mode)
If the origin server uses any proper TLS configuration, even a self-signed certificate, this method stops working. It only succeeds when the upstream connection to the origin is unsecured.
If you want to test this on a random site without Cloudflare or reverse proxy in general on HTTP: curl http://www.digiboy.ir/boobs.jpg -v
mort96|3 months ago
dhab|3 months ago
I didn't quite get if Automatic TLS (https://developers.cloudflare.com/ssl/origin-configuration/s...) could use plain transfers.
So:
* Is it insecure by default or you have to be intentionally insecure?
* Why would anyone pick the flexible/potentially-insecure option?
bawolff|3 months ago
p0w3n3d|3 months ago
</Irony>
spoiler|3 months ago
Certs used to be expensive, and had way more operational overhead and quirks (even setting up ACME/LE)
ranger_danger|3 months ago
bobmcnamara|3 months ago
udev4096|3 months ago
On a side note, nginx doesn't support HTTP/2 for https load balancing so I am thinking of switching to haproxy which supports it
butvacuum|3 months ago
huflungdung|3 months ago