For the Technical - I Don't Quite Understand This...

Anything that doesn't fit anywhere else below.

Moderators: kiore, Blip, The_Metatron

For the Technical - I Don't Quite Understand This...

#1  Postby Alan B » Oct 07, 2014 10:50 am

My Son highlighted this site:
https://www.grc.com/fingerprints.htm
So, I added the RatSkep address and got the following:
One or more errors were encountered when querying:
http://www.rationalskepticism.org

The SSL/TLS security certificate obtained from the remote server was invalid FOR THE EXACT DOMAIN YOU ENTERED. However, we were still able to obtain the certificate's common name and fingerprint, which appear below. Since something is wrong, please examine it carefully and give your close attention to the additional diagnostic note(s) appearing next:
Trustworthy certificates are “trusted” when they have been “signed” by a known and trusted “Certificate Authority” (CA). We trust the signer to have verified the identity of the signee. The trouble with the certificate that has just been received from the domain shown above, is that IT WAS NOT SIGNED by any known, authorized, recognized, and valid certificate authority. This most often occurs when a certificate is “self signed”, meaning that no higher authority is vouching for the identity and integrity of the server offering this certificate. (Note that NO VALID COMMERCIAL Internet web sites would ever do this!) While connections to any such web server will be encrypted, you really have no idea to whom your encrypted data is being sent: It could be your boss, your network's IT department (for capture, scanning, logging & analysis), or an entity much more malicious. PROCEED WITH CAUTION if you connect to any such remote web server, and try to determine WHY the server is offering a certificate which no valid certificate authority is vouching for.
The Domain Name (where the certificate was obtained) DOES NOT MATCH any of the names INSIDE the certificate: (And it must.) Trustworthy certificates contain a list of one or more domain names for which they are valid. The leftmost portion of such names MAY also contain an asterisk ( * ) acting as a “wildcard character” which is valid for any domain name appearing in place of the asterisk. The trouble with the certificate returned by the server that accepted the connection at the IP for the domain name shown above, is that no matter how we look at it, IT IS NOT VALID for the domain name. This would be like a web server using someone else's security certificate. It should not happen and you should proceed with caution.

You should examine the Domain Name and Certificate Name (also known as the “Common Name”) shown below. They will often be nearly identical. For example, the Certificate Name might simply have a ‘www’ prefix which is missing from the Domain Name. And if you were to enter the domain name with the leading ‘www’ everything would be fine. But if the names are very different, something is not right.
Web security certificates expire every two to three years so that the identity and integrity of the certificate's owner can be refreshed and reaffirmed. This goes a long way toward helping to keep the entire security certificate system trustworthy. The security certificate returned by THIS server is INVALID because it is either not yet valid or has expired from having been valid. (Certificates contain both a “not valid before” and “not valid after” field and the certificate should only be trusted between those two dates and times.

The trouble may be something you can remedy by altering the domain name submitted, or the trouble might lie with the configuration of the remote secure web server. You should examine the domain name submitted, above, the errors returned, and the error comments to determine your best course of action.


Domain Name Certificate Name EV Security Certificate's Authentic Fingerprint Click to view complete certificate chain
http://www.rationalskepticism.org ratskep — 90:33:29:4C:83:2B:36:2F:FE:25:F6:44:D3:E0:09:90:19:3C:53:18


:dunno:
I have NO BELIEF in the existence of a God or gods. I do not have to offer evidence nor do I have to determine absence of evidence because I do not ASSERT that a God does or does not or gods do or do not exist.
User avatar
Alan B
THREAD STARTER
 
Posts: 9999
Age: 87
Male

Country: UK (Birmingham)
United Kingdom (uk)
Print view this post

Re: For the Technical - I Don't Quite Understand This...

#2  Postby halucigenia » Oct 08, 2014 12:46 pm

https://www.rationalskepticism.org/
Returns:-
Apache 2 Test Page
powered by CentOS
grc.com; Custom Site Fingerprinting wrote:
GRC's web server can obtain and display the “fingerprint” of any HTTPS-capable public web server's secure connection certificate.
So I guess there is no HTTPS-capable public web server with a secure connection certificate for ratskep?
User avatar
halucigenia
 
Posts: 1232

Print view this post

Re: For the Technical - I Don't Quite Understand This...

#3  Postby VazScep » Oct 08, 2014 1:23 pm

Does anyone bother connecting to Ratskep by HTTPs? If not, you can ignore this warning. RationalSkepticism is a plain unsecure website, but I didn't think it pretended to be anything else.

If you try to open https:www.rationalskepticism.org in Firefox, you will (rightly) get the standard big fat warning saying that the connection is untrusted and you have to jump through hoops if you want to bypass that. If you're on a network that you don't necessarily trust, such as your work network, or the one in your internet cafe, Ratskep's unsigned certificates mean you have zero protection from someone doing a man-in-the-middle attack and snooping on all of your traffic in the clear. (*)

Again, treat RationalSkepticism as a plain unsecure website (non HTTPs).

(*) Unless you find some non-standard way to verify the certificate. For instance, my university doesn't have properly signed SSL certificates. But if you get onto the main network internally (or over some non-SSL based secure connection), you can obtain the CA certificate directly and register it manually in your favourite browser. That gives you all the protection you want.
Here we go again. First, we discover recursion.
VazScep
 
Posts: 4590

United Kingdom (uk)
Print view this post

Re: For the Technical - I Don't Quite Understand This...

#4  Postby Calilasseia » Oct 08, 2014 2:28 pm

This is one of the after effects of the failed experiment to enable HTTPS: connection to RatSkep.

A security certificate was obtained to allow that experiment to be conducted, but when HTTPS: connectivity failed to work for a lot of people, it was abandoned. As a corollary, the security certificate has lapsed, without being renewed.

I have a sneaking suspicion phpBB wasn't written with HTTPS: connectivity in mind, and that some of its internal workings flagrantly breach the protocols that a properly secure website is required to follow, hence the failure of the experiment, and the subsequent abandoning thereof. No one considered it worth bothering to renew a security certificate, for a website that was therefore destined to be forever connected via the standard and insecure HTTP: protocol.
Signature temporarily on hold until I can find a reliable image host ...
User avatar
Calilasseia
RS Donator
 
Posts: 22641
Age: 62
Male

Country: England
United Kingdom (uk)
Print view this post

Re: For the Technical - I Don't Quite Understand This...

#5  Postby VazScep » Oct 08, 2014 2:34 pm

The only reason I'd care for a secure connection here is in case someone snooped my password and then stole my account. But I don't really care about that much anyway, since I don't have any great attachment to "VazScep."

Everything I've posted on this website is completely public, so I don't care about having a secure connection to submit my waffle.
Here we go again. First, we discover recursion.
VazScep
 
Posts: 4590

United Kingdom (uk)
Print view this post


Return to General Science & Technology

Who is online

Users viewing this topic: No registered users and 1 guest