So, I know its been a bit quiet here, but we're working through getting through the last few items relating to cutting over to newer infrastructure. As such, its been working through the bug list, and there's one issue I want to get some feedback on.
Back in November when the infrastructure was upgraded to Ubuntu 22.04, a few users with older devices stopped being able to connect to SoylentNews. This confused me, since we've been using the same NGINX SSL termination setup that has been in use since at least 2016. Well, I finally found the root cause, and as it turns out, Canonical bumped up the minimum OpenSSL security level, which disabled several ciphers, and broke devices not supporting TLS 1.2 or later.
By testing the site with the SSL Labs site checker, it appears anything older than Android 4.0, or iOS 5 is broken. This mostly seems to be devices that are over a decade old at this point, and won't be able to browse the vast majority of sites on the Internet as is. We discussed this internally a bit, and I'm of the opinion that its not worth re-enabling the older ciphers to allow these devices to reconnect, especially since we're working to modernize the stack, and get it as up to date as we can get it. I also believe we had very few users who were actually affected by this, however, as the editors did get a few emails about SN breaking after the site upgrade, I wanted to poll the community, and make sure this is not a more widespread issue than initially believed.
Ultimately, this is going to be part of a broader discussion on what we will and won't support on SoylentNews going forward, and this seems as good of place as any to get the ball rolling.
~ NCommander
(Score: 2) by sjames on Thursday July 06 2023, @12:49AM
It's worth asking secure against what? The only thing remotely private about posting to SN is your password which is only very occasionally transmitted.
Honestly, there's not that much value in getting someone's SN password as long as it hasn't been re-used elsewhere. It's probably not worth exposing that you have managed to get a foothold on someone's machine. It's certainly not worth a targeted effort.
That just leaves keeping crappy ISPs from injecting extra ads. But there, even crappy encryption is good enough. It serves the same legal purpose as a crappy padlock on a fence that can be jumped over, the ISP can't claim they didn't know their intrusion was unwelcome. If you really want to get revenge on such a crappy ISP, add a custom HJTTP header with a witty saying and then slap them with a DMCA violation.