Chris Thompson

Results 43 comments of Chris Thompson

Hi, new maintainer of the site here :-). Sorry for the delayed response. We'd be happy to take a pull request for this. The development of new tests has slowed...

What's the expected behavior on macOS? Testing in Safari on macOS 10.15.2, it looks like self-signed.badssl.com is still working as expected (bypassable). Adding EKU to these certs sounds good either...

I think that TLS 1.3 support will require OpenSSL 1.1.0 (along with switching to mainline nginx versions, rather than stable). Unfortunately, this removes a bunch of weak/obsolete cipher and protocol...

I'll look into regenerating these. In the meantime, https://self-signed.badssl.com and https://untrusted-root.badssl.com cover these cases generally. These specific bad roots are primarily for testing _specific_ blocklisting of these certificates/roots in user...

> For what it's worth, the intermediate certificate `COMODO SSL CA` will expire in less than 24h, it is used at least on the https://sha1-intermediate.badssl.com/ domain. > > [![image](https://user-images.githubusercontent.com/3510190/83257855-802ff300-a1b5-11ea-94ec-b16ff3cd6c6b.png)](https://www.howfast.tech/) sha1-intermediate.badssl.com...

If this is relatively straightforward to configure in nginx, then I'd be happy to take a PR adding a new subdomain for this (or a snippet of nginx configuration I...

Ah yeah if it requires the server misbehaving in a way that OpenSSL doesn't directly support, then it's likely that we can't do it on badssl.com as the overhead of...

I think scoping this to top-level navigations makes sense (and has kind of been how I've been thinking about this, although that may be partially due to Chrome's implementation here)....

> we end up with mixed content blocking in cases where the content would not have been mixed if not for the top-level upgrade I would consider this to be...