While I agree that, yes everything SHOULD support TLS, there's a perfectly good 
reason for terminating TLS in something like (nginx/caddy/apache/etc):  X 
number of things supporting TLS on their web interface means X number of ways 
of configuring TLS.   If I terminate it on nginx, there's only a single way: 
the nginx config, which is then farily easily leveraged into having a single 
set allowed protocols and  ciphers. 

On Wed, Jan 26, 2022, at 9:33 AM, Mel Beckman wrote:
> People who advocate TLS lash-ups like nginx front ends remind me of Mr. Beans 
> DIY automobile security, which started with a screwed-on metal hasp and 
> padlock, and then continued to a range of additional “layers”. Not 
> “defense-in-depth”, merely unwarranted “complexity-in-depth”: 
> 
> https://youtu.be/CCl_KxGLgOA
> 
> 
> TLS is a standardized, fully open-source package that can be integrated into 
> even tiny IoT devices (witness this $10 WiFi module 
> https://www.adafruit.com/product/4201). The argument that people who want 
> intrinsically secure products can just bolt-on their own security are missing 
> the point entirely. Every web-enabled product should be required to implement 
> TLS and then let custiners decide when they want to enable it. Vendors who 
> are so weak that they can’t should have their products go straight into 
> /dev/null. 
> 
> -mel via cell
> 
>> On Jan 26, 2022, at 6:51 AM, heasley <h...@shrubbery.net> wrote:
>> 
>> Wed, Jan 26, 2022 at 07:21:19AM -0600, Mike Hammett:
>> 
>>> Why is it [TLS] even necessary for such a function? 
>> 
>> confidentiality and integrity, even if you do not care about authentication.
>> I am surprised that question is asked.
>> 
>> The fewer things that are left unprotected, the better for everyone.  those
>> with concern about erosion of their privacy and human rights benefit from
>> everything being protected, everywhere for everyone.

Reply via email to