Enforced https on public sites
Forum rules
This General Discussion board is meant for topics that are still relevant to Pale Moon, web browsers, browser tech, UXP applications, and related, but don't have a more fitting board available.
Please stick to the relevance of this forum here, which focuses on everything around the Pale Moon project and its user community. "Random" subjects don't belong here, and should be posted in the Off-Topic board.
This General Discussion board is meant for topics that are still relevant to Pale Moon, web browsers, browser tech, UXP applications, and related, but don't have a more fitting board available.
Please stick to the relevance of this forum here, which focuses on everything around the Pale Moon project and its user community. "Random" subjects don't belong here, and should be posted in the Off-Topic board.
-
- Astronaut
- Posts: 535
- Joined: 2019-08-13, 00:30
- Location: Casumia
Re: Enforced https on public sites
I wish I could voluntarily downgrade public sites to HTTP. There have been many times where a site, which I knew would not require transmitting anything sensitive, would display an expired certificate. I do not wish to add permanent exceptions to these sites in Pale Moon and do not know how to make temporary ones, so I turn away. On the other hand, the only website within the last decade I know to transmit any kind of sensitive information at all over HTTP is the all-important Neopets.
Browser: Pale Moon (official build, updated regularly)
Operating System: Linux Mint Debian Edition 4 (amd64)
※Receiving Debian 10 ELTS security upgrades
Hardware: HP Pavilion DV6-7010 (1400 MHz, 6 GB)
Ash is the best letter.
Operating System: Linux Mint Debian Edition 4 (amd64)
※Receiving Debian 10 ELTS security upgrades
Hardware: HP Pavilion DV6-7010 (1400 MHz, 6 GB)
Ash is the best letter.
-
- Keeps coming back
- Posts: 823
- Joined: 2015-06-01, 12:52
- Location: US Southeast
Re: Enforced https on public sites
Seems you've been out of the loop a bit. I believe the idea of 6-day certs were all the rage a few months back.
(I'm not saying that's a good idea, mind you.)
-
- Board Warrior
- Posts: 1006
- Joined: 2017-12-14, 12:59
-
- Astronaut
- Posts: 535
- Joined: 2019-08-13, 00:30
- Location: Casumia
Re: Enforced https on public sites
Clever, but I like to keep my browsing history. Is there a site with a failed certificate I can use to test whether such a site, when accessed, will show in my listing?
Browser: Pale Moon (official build, updated regularly)
Operating System: Linux Mint Debian Edition 4 (amd64)
※Receiving Debian 10 ELTS security upgrades
Hardware: HP Pavilion DV6-7010 (1400 MHz, 6 GB)
Ash is the best letter.
Operating System: Linux Mint Debian Edition 4 (amd64)
※Receiving Debian 10 ELTS security upgrades
Hardware: HP Pavilion DV6-7010 (1400 MHz, 6 GB)
Ash is the best letter.
-
- Moonbather
- Posts: 50
- Joined: 2019-03-23, 19:16
Re: Enforced https on public sites
Partly agree here, however the certificates can also be used for other services - postfix for me.
And OSCP is optional now, and Let's Encrypt will drop it.
-
- Pale Moon guru
- Posts: 37634
- Joined: 2011-08-28, 17:27
- Location: Motala, SE
Re: Enforced https on public sites
OCSP has always been optional. It's a revocation check, and failure to connect to OCSP servers is generally not fatal unless in tightly-controlled environments (which is why we have an option to enable that strictness but default not enabled).Veit Kannegieser wrote: ↑2025-06-10, 20:21And OSCP is optional now, and Let's Encrypt will drop it.
Let's Encrypt never revokes certs so it wouldn't do anything for them anyway, so there's nothing for them to lose by dropping it...

Of course, and those other applications should, if they want to maintain trust, have mechanisms to deal with revoked certificates too; whether that is infrequent CRL downloads or other ways. For the web, though, it's always been a more pressing thing, because of the much larger threat there.Veit Kannegieser wrote: ↑2025-06-10, 20:21the certificates can also be used for other services - postfix for me.
The fact that trust as part of TLS has been eroded this way doesn't take away that it's essential; encryption (for the sake of encryption) doesn't matter when the biggest risk isn't that some man-in-the-middle snoops on what you communicate with a legitimate server, but rather that malicious actors can impersonate servers and have cryptographic trust. In the situation we used to have, it was clear when something wasn't secure, because of the public net being unencrypted; the protocol was a good indicator and getting a certificate was involved. The current state of affairs is that the protocol means nothing, "mainstream" browsers don't even display EV certificates as such anymore to distinguish from the lowest-threshold ones, and it's all worse than it was before while everything is supposedly "more secure" with encryption everywhere now? Sorry, but no. In the practical Internet, we're worse off than we were.
"A dead end street is a place to turn around and go into a new direction" - Anonymous
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite