Smith & Wesson Forum

Go Back   Smith & Wesson Forum > Office > FORUM OFFICE

Notices

FORUM OFFICE This Area is For Any Complaints, Suggestions or Questions That You Might Have about forum operations.


Closed Thread
 
Thread Tools Display Modes
  #1  
Old 03-10-2017, 05:27 PM
perryhd's Avatar
perryhd perryhd is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Jul 2014
Location: AL
Posts: 586
Likes: 2,970
Liked 1,359 Times in 375 Posts
Default Insecure site warning

Every time I log in I get a warning from Mozilla Firefox that this site is insecure. Is this some thing I need to do something about. Any advice will be appreciated.
__________________
Old Age Ain't For Sissies
  #2  
Old 03-10-2017, 05:48 PM
vytoland's Avatar
vytoland vytoland is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Aug 2008
Location: Illinois
Posts: 5,658
Likes: 15,661
Liked 7,682 Times in 2,744 Posts
Default

i get the same goofy messages on internet sites i have been using for years............just the work of some halfwit at firefox "workin at its job" and waiting for the next paycheck...in between texting its friends.....
__________________
There's nowt so queer as folk
  #3  
Old 03-10-2017, 11:46 PM
vytoland's Avatar
vytoland vytoland is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Aug 2008
Location: Illinois
Posts: 5,658
Likes: 15,661
Liked 7,682 Times in 2,744 Posts
Default

this the firefox explanation for the warning.................

Insecure password warning in Firefox - Mozilla Support Community
__________________
There's nowt so queer as folk
  #4  
Old 03-11-2017, 11:37 AM
coltle6920's Avatar
coltle6920 coltle6920 is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Oct 2013
Location: Denver,Colorado
Posts: 4,214
Likes: 5,687
Liked 8,082 Times in 2,441 Posts
Default

I think the message is referring to some of the members here rather than the site itself.
  #5  
Old 03-11-2017, 04:33 PM
mcoe74's Avatar
mcoe74 mcoe74 is offline
US Veteran
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Nov 2011
Location: SW Florida
Posts: 1,726
Likes: 530
Liked 299 Times in 243 Posts
Default

I receive the same type of message using Google Chrome. Chrome message: Your connection to this site is not secure.
  #6  
Old 03-16-2017, 08:59 AM
TAC TAC is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Apr 2007
Location: S.E. Michigan
Posts: 832
Likes: 283
Liked 506 Times in 265 Posts
Default

Quote:
Originally Posted by coltle6920 View Post
I think the message is referring to some of the members here rather than the site itself.
No, it is the website that needs attention.

Last edited by TAC; 03-16-2017 at 09:03 AM.
  #7  
Old 03-16-2017, 09:00 AM
TAC TAC is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Apr 2007
Location: S.E. Michigan
Posts: 832
Likes: 283
Liked 506 Times in 265 Posts
Exclamation

Insecure passwords

Insecure passwords - Web security | MDN
  #8  
Old 03-16-2017, 09:02 AM
TAC TAC is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Apr 2007
Location: S.E. Michigan
Posts: 832
Likes: 283
Liked 506 Times in 265 Posts
Exclamation

Quote:
Originally Posted by vytoland View Post
this the firefox explanation for the warning.................

Insecure password warning in Firefox - Mozilla Support Community
What can I do if a login page is insecure?

If a login page for your favorite site is insecure, you can try and see if a secure version of the page exists by typing https:// before the url in the location bar. You can also try to contact the web administrator for the site and ask them to secure their connection.
Not recommended: You can also continue to log in to the website even if the connection is insecure, but do so at your own risk. If you do go this route, try to use a unique password or a password that you don’t also use for other important sites.
About insecure pages

Pages that need to transmit private information, such as credit cards, personal information and passwords, need to have a secure connection to help prevent attackers from stealing your information. (Tip: A secure connection will have "HTTPS" in the address bar, along with a green lock icon.)
Pages that don’t transmit any private information can have an unencrypted connection (HTTP). It is not advised to enter private information, such as passwords, on a web page that shows HTTP in the address bar. The information you enter can be stolen over this insecure connection.
  #9  
Old 03-16-2017, 09:06 AM
TAC TAC is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Apr 2007
Location: S.E. Michigan
Posts: 832
Likes: 283
Liked 506 Times in 265 Posts
Default

................

Last edited by TAC; 03-16-2017 at 09:07 AM.
  #10  
Old 03-20-2017, 03:08 AM
swsig's Avatar
swsig swsig is online now
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Jun 2015
Location: North Texas
Posts: 3,983
Likes: 8,228
Liked 10,579 Times in 2,986 Posts
Default

I got the same warning from Firefox. Typing "https://" in front of the address did no good. Neither Firefox nor Safari would connect when I did that. The powers-that-be need to switch to a secure login.
__________________
What, me worry?
  #11  
Old 03-20-2017, 08:26 AM
s&wchad's Avatar
s&wchad s&wchad is offline
Moderator
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Jan 2007
Location: Great Lakes State
Posts: 29,891
Likes: 12,800
Liked 34,012 Times in 7,986 Posts
Default

Quote:
Originally Posted by TAC View Post
What can I do if a login page is insecure?

Pages that need to transmit private information, such as credit cards, personal information and passwords, need to have a secure connection to help prevent attackers from stealing your information. (Tip: A secure connection will have "https:" in the address bar, along with a green lock icon.)
Pages that don’t transmit any private information can have an unencrypted connection (HTTP). It is not advised to enter private information, such as passwords, on a web page that shows HTTP in the address bar.
Read the above excerpt again and note the part I underlined.

This is just a gun board. We don't handle your banking, stock transfers or taxes and you don't enter critical information here. I assume you're all savvy enough to use different passwords on different websites.

If you look at the bottom of every page, you'll see the following:





This board is certified safe, but your connection to the internet may not be. Here are a few tips to protect yourself:
- Make sure your home wireless router is properly secured.
- Avoid logging onto sites when using free wifi (McDonald's, Dunkin' Donuts, etc...).
- Don't use common passwords like 111111, 123456, asdfgh, etc...
- Don't click on links you receive in emails, unless you requested the email (registration activation, password re-set, etc...).
__________________
"I also cook."
The Following User Likes This Post:
  #12  
Old 03-20-2017, 09:04 AM
TAC TAC is offline
Member
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Apr 2007
Location: S.E. Michigan
Posts: 832
Likes: 283
Liked 506 Times in 265 Posts
Default

This is a big issue for the Federal Government as well. Below is a thorough explanation, so we all have a better understanding. This is happening across our nation, and is something that system administrators are looking into.


The HTTPS-Only Standard

The American people expect government websites to be secure and their interactions with those websites to be private.
This site contains a web-friendly version of the White House Office of Management and Budget memorandum M-15-13, “A Policy to Require Secure Connections across Federal Websites and Web Services”, and provides technical guidance and best practices to assist in its implementation.
Goal

This Memorandum requires that all publicly accessible Federal websites and web services [1] only provide service through a secure connection. The strongest privacy and integrity protection currently available for public web connections is Hypertext Transfer Protocol Secure (HTTPS).
This Memorandum expands upon the material in prior Office of Management and Budget (OMB) guidance found in M-05-04 and relates to material in M-08-23. It provides guidance to agencies for making the transition to HTTPS and a deadline by which agencies must be in compliance.
Background

The unencrypted HTTP protocol does not protect data from interception or alteration, which can subject users to eavesdropping, tracking, and the modification of received data. The majority of Federal websites use HTTP as the primary protocol to communicate over the public internet. Unencrypted HTTP connections create a privacy vulnerability and expose potentially sensitive information about users of unencrypted Federal websites and services. Data sent over HTTP is susceptible to interception, manipulation, and impersonation. This data can include browser identity, website content, search terms, and other user-submitted information.
To address these concerns, many commercial organizations have adopted HTTPS or implemented HTTPS-only policies to protect visitors to their websites and services. Users of Federal websites and services deserve the same protection. Private and secure connections are becoming the Internet’s baseline, as expressed by the policies of the Internet’s standards bodies, popular web browsers, and the Internet community of practice. The Federal government must adapt to this changing landscape, and benefits by beginning the conversion now. Proactive investment at the Federal level will support faster internet-wide adoption and promote better privacy standards for the entire browsing public.
All browsing activity should be considered private and sensitive.
An HTTPS-Only standard will eliminate inconsistent, subjective determinations across agencies regarding which content or browsing activity is sensitive in nature, and create a stronger privacy standard government-wide.
Federal websites that do not convert to HTTPS will not keep pace with privacy and security practices used by commercial organizations, and with current and upcoming Internet standards. This leaves Americans vulnerable to known threats, and may reduce their confidence in their government. Although some Federal websites currently use HTTPS, there has not been a consistent policy in this area. An HTTPS-only mandate will provide the public with a consistent, private browsing experience and position the Federal Government as a leader in Internet security.
What HTTPS Does

HTTPS verifies the identity of a website or web service for a connecting client, and encrypts nearly all information sent between the website or service and the user. Protected information includes cookies, user agent details, URL paths, form submissions, and query string parameters. HTTPS is designed to prevent this information from being read or changed while in transit.
HTTPS is a combination of HTTP and Transport Layer Security (TLS). TLS is a network protocol that establishes an encrypted connection to an authenticated peer over an untrusted network.
Browsers and other HTTPS clients are configured to trust a set of certificate authorities [2] that can issue cryptographically signed certificates on behalf of web service owners. These certificates communicate to the client that the web service host demonstrated ownership of the domain to the certificate authority at the time of certificate issuance. This prevents unknown or untrusted websites from masquerading as a Federal website or service.
What HTTPS Doesn’t Do

HTTPS has several important limitations. IP addresses and destination domain names are not encrypted during communication. Even encrypted traffic can reveal some information indirectly, such as time spent on site, or the size of requested resources or submitted information.
HTTPS only guarantees the integrity of the connection between two systems, not the systems themselves. It is not designed to protect a web server from being hacked or compromised, or to prevent the web service from exposing user information during its normal operation. Similarly, if a user’s system is compromised by an attacker, that system can be altered so that its future HTTPS connections are under the attacker’s control. The guarantees of HTTPS may also be weakened or eliminated by compromised or malicious certificate authorities.
Challenges and Considerations

Site Performance: While encryption adds some computational overhead, modern software and hardware can handle this overhead without substantial deleterious impact on server performance or latency. Websites with content delivery networks or server software that support the SPDY or HTTP/2 protocols, which require HTTPS in some major browsers, may find their site performance substantially improved as a result of migrating to HTTPS.
Server Name Indication: The Server Name Indication extension to TLS allows for more efficient use of IP addresses when serving multiple domains. However, these technologies are not supported by some legacy clients. Web service owners should evaluate the feasibility of using this technology to improve performance and efficiency.
Mixed Content: Websites served over HTTPS need to ensure that all external resources (images, scripts, fonts, iframes, etc.) are also loaded over a secure connection. Modern browsers will refuse to load many insecure resources referenced from within a secure website. When migrating existing websites, this can involve a combination of automated and manual effort to update, replace, or remove references to insecure resources. For some websites, this can be the most time consuming aspect of the migration process.
APIs and Services: Web services that serve primarily non-browser clients, such as web APIs, may require a more gradual and hands-on migration strategy, as not all clients can be expected to be configured for HTTPS connections or to successfully follow redirects.
Planning for Change: Protocols and web standards improve regularly, and security vulnerabilities can emerge that require prompt attention. Federal websites and services should deploy HTTPS in a manner that allows for rapid updates to certificates, cipher choices (including forward secrecy) protocol versions, and other configuration elements. Agencies should monitor https.cio.gov and other public resources to keep apprised of current best practices.
Strict Transport Security: Websites and services available over HTTPS must enable HTTP Strict Transport Security (HSTS) to instruct compliant browsers to assume HTTPS going forward. This reduces insecure redirects, and protects users against attacks that attempt to downgrade connections to plain HTTP. Once HSTS is in place, domains can be submitted to a “preload list” used by all major browsers to ensure the HSTS policy is in effect at all times.
Domain Name System Security (DNSSEC): The new policy outlined in this Memorandum does not rescind or conflict with M-08-23, “Securing the Federal Government’s Domain Name System Infrastructure”. Once DNS resolution is complete, DNSSEC does not ensure the privacy or integrity of communication between a client and the destination IP. HTTPS provides this additional security.
Cost Effective Implementation

Implementing an HTTPS-only standard does not come without a cost. A significant number of Federal websites have already deployed HTTPS. The goal of this policy is to increase that adoption.
The administrative and financial burden of universal HTTPS adoption on all Federal websites includes development time, the financial cost of procuring a certificate and the administrative burden of maintenance over time. The development burden will vary substantially based on the size and technical infrastructure of a site. The compliance timeline, outlined in this Memorandum, provides sufficient flexibility for project planning and resource alignment.
OMB affirms that tangible benefits to the American public outweigh the cost to the taxpayer. Even a small number of unofficial or malicious websites claiming to be Federal services, or a small amount of eavesdropping on communication with official U.S. government sites could result in substantial losses to citizens.
Technical assistance provided at https.cio.gov will aid in the cost-effective implementation of this policy.
Guidelines

In order to promote the efficient and effective deployment of HTTPS, the timeframe for compliance, outlined below, is both reasonable and practical.
This Memorandum requires that Federal agencies deploy HTTPS on their domains using the following guidelines.
  • Newly developed websites and services at all Federal agency domains or subdomains must adhere to this policy upon launch.
  • For existing websites and services, agencies should prioritize deployment using a risk-based analysis. Web services that involve an exchange of personally identifiable information (PII), where the content is unambiguously sensitive in nature, or where the content receives a high-level of traffic should receive priority and migrate as soon as possible.
  • Agencies must make all existing websites and services accessible through a secure connection [3] (HTTPS-only, with HSTS) by December 31, 2016.
  • The use of HTTPS is encouraged on intranets [4], but not explicitly required.
To monitor agency compliance, a public dashboard has been established at pulse.cio.gov.
Footnotes

⬑ 1. Publicly-accessible websites and services are defined here as online resources and services available over HTTP or HTTPS over the public internet that are maintained in whole or in part by the Federal Government and operated by an agency, contractor, or other organization on behalf of the agency. They present government information or provide services to the public or a specific user group and support the performance of an agency’s mission. This definition includes all web interactions, whether a visitor is logged-in or anonymous.
⬑ 2. In the context of HTTPS on the web, a certificate authority is a third party organization or company trusted by browsers and operating systems to issue digital certificates on behalf of domain owners.
⬑ 3. Allowing HTTP connections for the sole purpose of redirecting clients to HTTPS connections is acceptable and encouraged. HSTS headers must specify a max-age of at least 1 year.
⬑ 4. “Intranet” is defined here as a computer network that is not directly reachable over the public internet.


[source]
https://https.cio.gov/
The Following User Likes This Post:
  #13  
Old 03-20-2017, 09:24 AM
s&wchad's Avatar
s&wchad s&wchad is offline
Moderator
Insecure site warning Insecure site warning Insecure site warning Insecure site warning Insecure site warning  
Join Date: Jan 2007
Location: Great Lakes State
Posts: 29,891
Likes: 12,800
Liked 34,012 Times in 7,986 Posts
Default

We're not quite as big or as choice a target as the Fed's (yet).

As I said, we're JUST a gun board and this site is certified safe.
__________________
"I also cook."

Last edited by s&wchad; 04-26-2017 at 12:53 PM.
The Following 6 Users Like Post:
Closed Thread

Thread Tools
Display Modes

Posting Rules
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Traded Off Site 629-2 "MOUNTAIN" 4" Tapered Barrel. LNIB TRADED OFF SITE jjbrewst1 GUNS - For Sale or Trade 0 02-21-2016 12:00 AM
Rear Site MOA adjustment on stock site bobermo Smith & Wesson M&P 15-22 0 02-09-2013 11:22 PM

Powered by vBadvanced CMPS v3.2.3
smith-wessonforum.com tested by Norton Internet Security smith-wessonforum.com tested by McAfee Internet Security

All times are GMT -4. The time now is 09:09 PM.


Smith-WessonForum.com is not affiliated with Smith & Wesson Holding Corporation (NASDAQ Global Select: SWHC)