permission.site icon indicating copy to clipboard operation
permission.site copied to clipboard

Test with an unknown CA or self-signed certificate

Open pinobatch opened this issue 3 years ago • 2 comments

Several private web servers have no fully qualified domain name (FQDN) and therefore can have no certificate issued by a certificate authority that major web browsers recognize by default. This includes corporate intranet sites, as well as any appliance on a home network (such as a router, printer, or NAS device) that lacks a valid binding to a dynamic DNS service. Any HTTPS connection to such a server would raise an interstitial certificate warning.

I suggest adding a self-signed version to test whether a user agent's secure context determination differs between a site using a certificate issued by a public CA and a site relying on an exception added by the user.

pinobatch avatar Mar 04 '21 04:03 pinobatch

permission.site uses very straightforward static hosting right now; this seems more like a job for badssl.com. (You can of course do a secure context calculation using one line of JS. But will admit that browsers are frustratingly inconsistent about what they consider a secure context.)

permission.site is primarily designed for browser vendors to test their UI. What audience do you have in mind for your suggestion?

lgarron avatar Mar 04 '21 08:03 lgarron

I had developers of web applications to run on these sorts of home networking appliances in mind.

pinobatch avatar Mar 04 '21 22:03 pinobatch