2017-09-28 19:56 GMT+03:00 Konstantin Kolinko <knst.koli...@gmail.com>:
> 2017-09-26 11:57 GMT+03:00 Oliver Heister <oliverheis...@gmail.com>:
>>  2. Currently MITM attacks by evil ISPs or WiFi networks are possible
>> against people downloading tomcat from
>> http://tomcat.apache.org/download-80.cgi . (The page has links to PGP, md5
>> and sha1 hashes for validation, but the links are on a http page that does
>> not redirect to https. This means they could be replaced in case of MITM.)
>>
>> IMO a HTTP 301 redirect to the https version and HSTS headers should be
>> added to http://tomcat.apache.org/ .
>
> The recommended way to validate releases it to check the PGP
> signature, not the checksums.
>
> It is not so easy to compromise a PGP signature. You cannot generate a
> new signature without having a key.
>
>
> I think that HSTS is an overkill.
>
> Maybe update links to *.cgi pages (in menu and on the site) to use https:

I updated XSLT stylesheet that is used to generate the tomcat.apache.org site
so that all links to *.cgi pages are automatically updated to use
https://tomcat.apache.org.

I also updated the links to archive.apache.org, blogs.apache.org,
wiki.apache.org
and ASF fundraising & sponsorship pages to use https.


Best regards,
Konstantin Kolinko

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to