Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

But that behavior is true and exploitable for HTTP as well, isn't it? It is a risk if there is no specific vhost config for the validated domain, which means a customer pointed the DNS to the shared host without also configuring that host to serve content for his domain from his account.

I realize in current real-world setups you would normally start with a HTTP-only config and only later or maybe never configure HTTPS for that domain, or configure both protocols simultaneously. And almost never the opposite where you configure HTTPS only and someone else would be able to grab your HTTP traffic. So that's still a good argument to do HTTP only, thank you for explaining it.

I did not know http-01 would follow redirect to HTTPS, that is also really good to know and should be a good way for some setups.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: