Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discourage use of insecure HTTP for client_id and redirect_uri? #119

Open
saschanaz opened this issue Mar 18, 2023 · 3 comments
Open

Discourage use of insecure HTTP for client_id and redirect_uri? #119

saschanaz opened this issue Mar 18, 2023 · 3 comments

Comments

@saschanaz
Copy link

Per https://indieauth.spec.indieweb.org/#client-identifier:

Client identifier URLs MUST have either an https or http scheme

But the spec does not discourage the latter, nor whether the server may reject the latter, and same for redirect_uri. Should there be some explicit discouragement?

@omz13
Copy link

omz13 commented Nov 27, 2023

It is 2023, the world has changed since the web was born: https is cheap, efficient, and ubiquitous, so yes, can we just move to https (and preferably tls 1.2 or better) by shifting the emphasis.

Plus, on iOS, macOS, establishing an insecure http connection is an almost impossible task, which means any clients on those platforms will, sooner rather than later, be forced to https.

@darrenmeehan
Copy link

darrenmeehan commented Dec 28, 2023

This is something I was surprised by when setting up my own site.
As a user it was annoying having to specify the scheme each time. I've read in places that my domain is my identity, but this isn’t the full picture.

As I developer think using http breaks down the trust model of indie auth.

I’d go further than discouraging http, and enforce https. I don't know enough about the ecosystem to know what getting there looks like.

@darrenmeehan
Copy link

#103 is a similar issue here which mentions enforcement, but there's more discussion here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants