{"id":30150,"date":"2015-04-02T06:43:58","date_gmt":"2015-04-02T10:43:58","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/new-firefox-version-says-might-as-well-to-encrypting-all-web-traffic.php"},"modified":"2015-04-02T06:43:58","modified_gmt":"2015-04-02T10:43:58","slug":"new-firefox-version-says-might-as-well-to-encrypting-all-web-traffic","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/new-firefox-version-says-might-as-well-to-encrypting-all-web-traffic.php","title":{"rendered":"New Firefox version says \u201cmight as well\u201d to encrypting all Web traffic"},"content":{"rendered":"<p><p>    Developers of the Firefox browser have moved one step closer to    an Internet that encrypts all the world's traffic with a new    feature that can cryptographically protect connections even    when servers don't support the HTTPS protocol.  <\/p>\n<p>    OE, as opportunistic encryption is often abbreviated, was    turned on by default in Firefox 37, which was released this    week. The move comes 17 months after an Internet Engineering    Task Force working group     proposed OE become an official part of the HTTP 2.0    specification. The move garnered critics and supporters    alike, with the former arguing it may delay some sites from    using the more secure HTTPS protections and the latter saying,    in effect, some protection is better than none. The chief    shortcoming of OE is its lack of authentication for    cryptographically validating that a connected server is    operated by the organization claiming ownership.  <\/p>\n<p>    In a     recent blog post, Mozilla developer Patrick McManus laid    out some of the thinking and technical details behind the move    to support HTTP 2 in Firefox:  <\/p>\n<p>      OE provides unauthenticated encryption over TLS for data that      would otherwise be carried via clear text. This creates some      confidentiality in the face of passive eavesdropping and also      provides you much better integrity protection for your data      than raw TCP does when dealing with random network noise. The      server setup for it is trivial.    <\/p>\n<p>      These are indeed nice bonuses for http:\/\/ - but it still      isn't as nice as <a href=\"https:\/\/\">https:\/\/<\/a>. If you can run https you should -      full stop. Don't make me repeat it \ud83d\ude42 Only https protects you      from active man in the middle attackers.    <\/p>\n<p>      But if you have long tail of legacy content that you cannot      yet get migrated to https, commonly due to mixed-content      rules and interactions with third parties, OE provides a      mechanism for an encrypted transport of http:\/\/ data.      That's a strict improvement over the      cleartext alternative.    <\/p>\n<p>      Two simple steps to configure a server for OE    <\/p>\n<p>      When the browser consumes that response header it will start      to verify the fact that there is a HTTP\/2 service on port      443. When a session with that port is established it will      start routing the requests it would normally send in      cleartext to port 80 onto port 443 with encryption instead.      There will be no delay in responsiveness because the new      connection is fully established in the background before      being used. If the alternative service (port 443) becomes      unavailable or cannot be verified Firefox will automatically      return to using cleartext on port 80. Clients that don't      speak the right protocols just ignore the header and continue      to use port 80.    <\/p>\n<p>      This mapping is saved and used in the future. It is important      to understand that while the transaction is being routed to a      different port the origin of the resource hasn't changed      (i.e. if the cleartext origin was <a href=\"http:\/\/www.example.com:80\" rel=\"nofollow\">http:\/\/www.example.com:80<\/a>      then the origin, including the http scheme and the port 80,      are unchanged even if it routed to port 443 over TLS). OE is      not available with HTTP\/1 servers because that protocol does      not carry the scheme as part of each transaction which is a      necessary ingredient for the Alt-Svc approach.    <\/p>\n<p>    McManus may be overstating the ease many site operators will    have in supporting OE. At the moment, implementing HTTP 2 is    anything but trivial, mainly because popular Web servers such    as Apache and nginx don't    yet ship with HTTP 2 support. Still, Mozilla's overture is    a start. In February, McManus said     nine percent of all Firefox release channel HTTP transactions    were already happening over HTTP 2, as users with Firefox    35 or 36 beta connected to sites, such as Google and Twitter,    that had implemented the updated protocol. Now that Mozilla    offers fuller support in version 37, OE could gain wider use.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2015\/04\/new-firefox-version-says-might-as-well-to-encrypting-all-web-traffic\" title=\"New Firefox version says \u201cmight as well\u201d to encrypting all Web traffic\">New Firefox version says \u201cmight as well\u201d to encrypting all Web traffic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Developers of the Firefox browser have moved one step closer to an Internet that encrypts all the world's traffic with a new feature that can cryptographically protect connections even when servers don't support the HTTPS protocol. OE, as opportunistic encryption is often abbreviated, was turned on by default in Firefox 37, which was released this week. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-30150","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30150"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=30150"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/30150\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=30150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=30150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=30150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}