Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 15 submissions in the queue.
Meta
posted by martyb on Wednesday September 15 2021, @02:45PM   Printer-friendly

Late last night (~10 PM UTC), the security certificates for SoylentNews.org expired. (Out-of-date certs result in nasty warning messages being displayed by your browser.)

Please accept my apologies for any inconvenience the outage caused.

Unfortunately, that was after I (and others on staff who could do anything about it) had gone to bed.

I had personally updated the certs in the past, but the last time was years ago. (TheMightyBuzzard had previously — and subsequently — handled getting and applying updated certs.) It had been so long that I could not find my notes on the process. (Note to self: it helps to look in the correct directory tree!)

Thankfully, audioguy appeared and was able to get things updated.

Please join me in thanking him for getting things straightened out!

P.S. The current certs are due to expire December 14, 2021, Please feel free to remind us as that date approaches!

P.P.S. The technical staff is aware of various automated solutions to renewals but made a conscious decision to do them manually. Remember that people make mistakes but to really foul things up use a computer!


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Informative) by FatPhil on Wednesday September 15 2021, @02:56PM (8 children)

    by FatPhil (863) <{pc-soylent} {at} {asdf.fi}> on Wednesday September 15 2021, @02:56PM (#1177991) Homepage
    We have opted for some higher security flag that demands that browsers reject out-of-date certificates, no matter what the user wants. Some versions of Firefox will explain the error/feature:
    "This site uses HTTP Strict Transport Security (HSTS) to specify that Firefox may only connect to it securely. As a result, it is not possible to add an exception for this certificate."

    Fortunately some legacy browsers do not honour this flag, so it was still possible to access the site. I could happily use w3m, for example.
    --
    Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
    Starting Score:    1  point
    Moderation   +2  
       Informative=2, Total=2
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 4, Informative) by JoeMerchant on Wednesday September 15 2021, @03:08PM (2 children)

    by JoeMerchant (3937) on Wednesday September 15 2021, @03:08PM (#1178000)

    Chrome explained the HSTS thing and refused to load the site.

    --
    🌻🌻 [google.com]
    • (Score: 2) by EvilSS on Wednesday September 15 2021, @03:33PM (1 child)

      by EvilSS (1456) Subscriber Badge on Wednesday September 15 2021, @03:33PM (#1178016)
      Weird, I was able to get in using Chrome (Firefox told me to fuck straight off though).
      • (Score: 2) by JoeMerchant on Wednesday September 15 2021, @06:09PM

        by JoeMerchant (3937) on Wednesday September 15 2021, @06:09PM (#1178068)

        I didn't persist on Chrome looking for bypass settings, I just opened whatever was on the screen and none of it let me in.

        Chrome in Ubuntu, relatively up to date.

        --
        🌻🌻 [google.com]
  • (Score: 2, Informative) by Anonymous Coward on Wednesday September 15 2021, @03:14PM

    by Anonymous Coward on Wednesday September 15 2021, @03:14PM (#1178006)

    One way to bypass this in a modern browser, is to have the browser forget it has seen the HSTH header. If all site data is cleaned, the next time the browser starts it will just complain about a bad certificate and the advanced option will allow an override. This of course is a terrible idea and it would be best just to wait, but it does work.

  • (Score: 0) by Anonymous Coward on Wednesday September 15 2021, @03:18PM

    by Anonymous Coward on Wednesday September 15 2021, @03:18PM (#1178009)

    You could do it with Firefox by toggling some ...stricttransport... setting in about:config to false and then editing a site security text file in your firefox profile to remove the soylentnews.org line.

  • (Score: 1, Interesting) by Anonymous Coward on Wednesday September 15 2021, @03:52PM (2 children)

    by Anonymous Coward on Wednesday September 15 2021, @03:52PM (#1178019)

    We have opted for some higher security flag that demands that browsers reject out-of-date certificates, no matter what the user wants. Some versions of Firefox will explain the error/feature:
    "This site uses HTTP Strict Transport Security (HSTS) to specify that Firefox may only connect to it securely. As a result, it is not possible to add an exception for this certificate."

    I have opted for my choices to take priority and edited my browser to give me the option to continue. Open source FTW.

    • (Score: 2) by RS3 on Wednesday September 15 2021, @11:43PM (1 child)

      by RS3 (6367) on Wednesday September 15 2021, @11:43PM (#1178146)

      Which browser?

      • (Score: 1, Interesting) by Anonymous Coward on Thursday September 16 2021, @01:44AM

        by Anonymous Coward on Thursday September 16 2021, @01:44AM (#1178172)

        I only do FF browsers, in this case New Moon.

        --- a/docshell/base/nsDocShell.cpp
        +++ b/docshell/base/nsDocShell.cpp
        @@ -5067,7 +5067,11 @@ nsDocShell::DisplayLoadError(nsresult aError, nsIURI* aURI,
                          // never want to show the "Add Exception" button for these sites.
                          // In the future we should differentiate between an HSTS host and a
                          // pinned host and display a more informative message to the user.
        - if (isStsHost || isPinnedHost) {
        + // it is my browser and I do want to be able to make
        + // an exception to cert issues, as long as I am still talking
        + // encrypted.
        + //if (isStsHost || isPinnedHost) {
        + if (isPinnedHost) {
                              cssClass.AssignLiteral("badStsCert");
                          }