You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When a site being proxied has an invalid cert (e.g. https://wrong.host.badssl.com/ or any of the others on https://badssl.com), warcproxy still shows the nice valid green "Warcproxy CA on " certificate.
It would be nice (and much safer) if it checked for revoked/invalid certificates and showed a proxied invalid certificate.
The reason I'm asking is because I'm setting up a general-purpose proxy to archive all my web browsing, and I feel kind of unsafe without any protection against invalid certificates.
The text was updated successfully, but these errors were encountered:
This is a problem I've been concerned about for a long time but hadn't considered the fact that it's solvable, so thanks for the idea! It will be a bit of work to implement because at the moment warcprox presents the certificate to the proxy client before opening a connection to the remote server. That's not the right way to do it anyway because we miss the chance to respond with a 502 to the CONNECT request, in case of an error connecting to the remote server. So this issue is good extra motivation for fixing.
I'm not sure when I'll have time to work on it. A pull request would accelerate the process. :)
When a site being proxied has an invalid cert (e.g. https://wrong.host.badssl.com/ or any of the others on https://badssl.com), warcproxy still shows the nice valid green "Warcproxy CA on " certificate.
It would be nice (and much safer) if it checked for revoked/invalid certificates and showed a proxied invalid certificate.
The reason I'm asking is because I'm setting up a general-purpose proxy to archive all my web browsing, and I feel kind of unsafe without any protection against invalid certificates.
The text was updated successfully, but these errors were encountered: