Hacker News new | past | comments | ask | show | jobs | submit login

> I prefer to rely on a proxy to perform TLS instead of the browser.

That's one step forward and about 30 steps backwards if you're actually doing that for security. Proxies silently accept broken TLS configuration all the time and serve then to you as https secured. You're unlikely to encounter invalid https configurations nowadays, so you likely won't ever notice, but it's definitely less secure to break the TLS connection in the proxy




> Proxies silently accept broken TLS configuration all the time

I don't want the browser to enforce TLS configuration; the proxy could be configurable to set it how I want it to accept or not accept broken TLS configurations.


Would be interested to see a list of those "about 30" steps. Surely, the number is neither made-up nor arbitrary.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: