SSL Now Enforced Site-Wide

We are now secure! Any page requests for http://VideoSift.com will now be redirected to https://VideoSift.com.

It took a lot of effort to go through as many of our templates as I could find where http:// was hard-coded into a URL and fix those, but there may still be some outstanding. If there is any such insecure content embedded on the page it will generate a "mixed-content" warning in your browser's console and the "Secure" padlock in your browser will look broken (or something). Also, you may also be able to identify non-secure images and embeds (like videos) because they will fail to load.



Thanks!
lucky760 says...

Nope, none at all if I"m being honest.

...

It's incredible that it's so easy to create an SSL certificate supported in most browsers now (and for free!) - good times.

ant said:

I hope SSL doesn't suck up a lot of resources on VS!

lucky760 says...

That's a GREAT point [not to mention a very good memory you have there]!

Yes, this does mean it *should* be able to work again, but of course I'll probably need to investigate and maybe tweak it to get it in proper working order. I'll do that soon.

oritteropo said:

This should allow the bookmarklet to start working again (assuming it's been updated to use the https submission url).

eric3579 says...

Nope. Still can't get it to work. I always assumed it was on my end somehow. Maybe it's not me after all. FIX YOUR BROKE ASS SHIT

...or is it really me?

lucky760 said:

That's a GREAT point [not to mention a very good memory you have there]!

Yes, this does mean it *should* be able to work again, but of course I'll probably need to investigate and maybe tweak it to get it in proper working order. I'll do that soon.

mxxcon says...

videosift.com is advertising 2600:3c00::f03c:91ff:fe70:f3af as its IPv6 address. However, that address is not listening on 443. So either don't advertise IPv6 or enable ssl on it.

Additionally, your current configuration supports SSLv3 protocol, which is old and insecure and should be disabled. And some other sub-optimal settings.
Check out https://www.ssllabs.com/ssltest/analyze.html?d=videosift.com
Consider updating your OpenSSL library and configuring nginx as shown at https://cipherli.st/

And please make sure you have some sort of automated way to renew letsencrypt cert since it's only for 3 months.

lucky760 said:

Nope, none at all if I"m being honest.

...

It's incredible that it's so easy to create an SSL certificate supported in most browsers now (and for free!) - good times.

dingens says...

Well done!
Just a little heads up: The old channel URLs https://<channel>.videosift.com still work )and forward to https://videosift.com/<channel>), but have an invalid certificate, since VS doesn't use a wildcard certificate. Minor thing, but I thought I'll tell you.

radx says...

Dropping some ECDHE into your ciper suite would be really appreciated, so that I don't have to change my security settings everytime I want to pay VS a visit.

ant says...

Which web browser(s) do you use for that?

radx said:

Dropping some ECDHE into your ciper suite would be really appreciated, so that I don't have to change my security settings everytime I want to pay VS a visit.

radx says...

At that moment, Firefox 51.0. But I've had some ciphers disabled since the early days of Logjam attacks, which included all ciphers using Diffie-Hellman without elliptic curves. That's why there was no overlap between accepted ciphers on my end and ciphers supplied by VS.

ant said:

Which web browser(s) do you use for that?

ant says...

Ah. Late last night after 11 PM PST, VS was showing:

"Secure Connection Failed

An error occurred during a connection to videosift.com.

Cannot communicate securely with peer: no common encryption algorithm(s).

Error code: <a rel="nofollow" id="errorCode" title="SSL_ERROR_NO_CYPHER_OVERLAP">SSL_ERROR_NO_CYPHER_OVERLAP

The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.

Please contact the website owners to inform them of this problem."


https://s28.postimg.org/9id7f2tjx/ssl.jpg for a screen shot/capture from SM's Page Info's Security tab.


I could reproduce this error in both of my computers (64-bit W7 HPE SP1 OS & 64-bit Linux/Debian Jessie/stable)'s SeaMonkey v2.46 web browsers. Also, Firefox v51 in my Debian box. I could not reproduce it in W7's IE11 & Debian's Chrome v50 web browsers that aren't based on Mozilla's Gecko engine.


I told Dag and Lucky760 about it, and it was fixed about 1.5 hours later. Kudos to the quick fixes!

radx said:

At that moment, Firefox 51.0. But I've had some ciphers disabled since the early days of Logjam attacks, which included all ciphers using Diffie-Hellman without elliptic curves. That's why there was no overlap between accepted ciphers on my end and ciphers supplied by VS.

Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists

New Blog Posts from All Members