lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <alpine.LFD.2.20.1602112225350.16884@wniryva> Date: Thu, 11 Feb 2016 22:26:58 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> Cc: fulldisclosure@...lists.org, bugtraq@...urityfocus.com Subject: Re: [FD] [oss-security] HTTPS Only (Open Source, Python) +-- On Thu, 11 Feb 2016, David Leo wrote --+ | If browser tries to access HTTP address, | you will have three options: | try HTTPS, | Google Cache, | or copy-and-paste the address. | | There is no option to "temporarily bypass HTTPS Only". | You can always do that in another browser. | | Project Home Page: | https://httpsonly.github.io/ Browsers too are moving there: -> https://blog.mozilla.org/security/2015/04/30/deprecating-non-secure-http/ (just to note) -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists