CARVIEW |
HTTPS Now allows users to contribute information about how websites use HTTPS, including if the site uses HTTPS on all pages, serves mixed content, etc. If you don't know what these terms mean, just click on the question mark at the top of each column. To edit an entry, click on the edit link in each row. To see more info about a site, click on the arrow in the Show Notes column.
Does the website use HTTPS?
HTTPS (HTTP Secure) is the secure version of the web's HTTP protocol. When sites use HTTPS, users' requests to the site, as well as the site's replies, are encrypted. This makes it harder for eavesdroppers to know what a user is doing on the site, including what the user is reading or writing or which parts of the site the user is communicating with. Using HTTPS is GOOD. Sites should do this.
Is the website free of mixed content?
Mixed content is a problem that occurs when a site is using HTTPS for a page as a whole, but some elements on that page, such as an image, are not encrypted with HTTPS. This can let someone eavesdrop on or tamper with that part of the page. For instance, if a news or encyclopedia site doesn't encrypt images, an eavesdropper could see what images are loaded and potentially deduce which news or encyclopedia articles you're reading. If a webmail site doesn't encrypt its Javascript (or parts of the page that can load Javascript), an eavesdropper could tamper with the site's Javascript code and reprogram it to leak unencrypted copies of your e-mail.
Sites that have mixed content are also potentially vulnerable to attack software like Firesheep. This vulnerability may exist even if a particular attack program doesn't appear to work against a particular web site with some minor technical changes. Having pages free of mixed content is GOOD. Sites should do this.
Note: different browsers have different ways of determining whether there is mixed content on a page (i.e., insecure elements on an otherwise secure page), and therefore one browser might fully trust a site while another will give you a warning. So, for example, going to https://www.youtube.com in Chrome triggers a mixed content warning, but visiting this site in Firefox does not. That said, if any browser is giving you a mixed content warning, there’s probably a reason why.
Is HTTPS in use for all pages on the entire site?
A site can provide the best protection for its users by using HTTPS on all parts and elements of the site, without exception. Among other benefits, this makes it harder for an eavesdropper to gather clues about how a user is using a site, such as which parts of the site they are using. It also prevents attackers from corrupting or altering information presented on the site in ways that could confuse or mislead users, or draw them away from the real site to counterfeit versions. Using HTTPS on all pages is GOOD. Sites should do this.
Is HTTPS in use on all pages where a user enters personally identifying information?
Some sites use HTTPS for some pages but not for others (e.g. login and payment pages are encrypted, but browsing is not). This means that the level of protection provided by those sites is inconsistent and leaves you vulnerable to attack. Using HTTPS on pages where users enter personal information is GOOD. Sites should do this.
Does the website use secure cookies?
For sites that require users to log in, the site may set a cookie in your browser containing authentication information that helps the site recognize that requests from your browser are allowed to access information in your account.
If the site uses HTTPS, the correct security practice is to mark these cookies "secure", which prevents them from being sent to a non-HTTPS page, even at the same URL. If the cookies are not "secure," an attacker can trick your browser into going to a fake non-HTTPS page; when your browser sends the cookies, the eavesdropper can record them and then use them to log into your account. Using secure cookies is GOOD. Sites should do this.
Is the SSL certificate valid?
Sites that use HTTPS present a cryptographic certificate to your browser whenever you access them. It shows that your connection to the site is not being tampered with. The certificate process is important because tampering and eavesdropping may not be otherwise apparent. For this process to work correctly, all sites should present a current, valid certificate from a mainstream certificate issuer, and that certificate should correctly refer to the actual site name through which the site is being accessed. If the site presents a certificate that's expired, invalid, unrecognized by mainstream browsers, doesn't refer to the name through which the site is accessed, etc., browsers can't be sure that the connection is really secure. Using a valid certificate is GOOD. Sites should do this.
What is the key strength?
The cryptographic algorithms that sites use to protect information as it travels over the Internet come in various versions and strengths. Using up-to-date and strong versions of these algorithms provides better protection against sophisticated attackers who might be able to break weaker versions, some day, if not now. Although there are several different features of a site's encryption that are potentially relevant, we are choosing to document just one of these: the key length (or strength), which is a numerical measurement of the size (and thus resistant to some attacks) of the site's public encryption key. Using a longer key length is GOOD. Sites should use the longest key length that is practical for their situation. According to U.S. government security recommendations, sites should now begin using keys with a minimum length of 1024 bits.
Does the website use HSTS? (HTTP Strict Transport Security)
HSTS (HTTPS Strict Transport Security) is a new standard by which a web site can request that users automatically always use HTTPS when communicating with that site. The users' browsers will remember this request and automatically turn on HTTPS when connecting to the site in the future, even if the user didn't specifically ask for it. Using HSTS is GOOD. Sites should do this.
Name | Uses HTTPS on Some Pages | Free of Mixed Content | Uses HTTPS on All Pages | All Identifying Information Encrypted | Only Uses Secure Cookies | Has a Valid SSL Certificate | Key Size | Uses HSTS | Edit Entry | Show Notes | |
---|---|---|---|---|---|---|---|---|---|---|---|
2leep.com | no | not applicable | not applicable | not applicable | not applicable | not applicable | not applicable | Edit | |||
Number of edits: 1 Show |
|||||||||||
4tulemar.com | yes | no | yes | yes | no | yes | 2048 | no | Edit | ||
Number of edits: 2 Show |
|||||||||||
Arch Linux | yes | yes | no | yes | yes | 2048 | no | Edit | |||
Number of edits: 1 Show |
|||||||||||
SifterApp.com | yes | no | yes | yes | yes | yes | 2048 | yes | Edit | ||
Number of edits: 2 Show |
|||||||||||
Thumbtack.com | yes | no | yes | yes | yes | yes | 2048 | yes | Edit | ||
Number of edits: 2 Show |
|||||||||||
Thumbtack.com | 2048 | Edit | |||||||||
Number of edits: 1 Show |
|||||||||||
Tutkiun.com | no | no | no | yes | yes | not applicable | Edit | ||||
Number of edits: 3 Tutkiun! is The Technology Guide - a place for programming languages comparison, how-to articles, social networking tricks and tips etc. Show |
|||||||||||
Vendder | not applicable | not applicable | not applicable | not applicable | not applicable | not applicable | not applicable | Edit | |||
Number of edits: 1 Show |
|||||||||||
Www.youtube.com | no | no | yes | yes | yes | yes | yes | Edit | |||
Number of edits: 4 Vite Show |
|||||||||||
a.fsdn.com | yes | no | yes | yes | not applicable | yes | 1024 | no | Edit | ||
Number of edits: 1 Show |
|||||||||||
abnamro.nl | yes | no | no | yes | no | yes | 2048 | no | Edit | ||
Number of edits: 1 Parts of the site switch to http, some are optionally https. Show |
|||||||||||
about.com | no | not applicable | not applicable | not applicable | not applicable | not applicable | - | not applicable | Edit | ||
Number of edits: 2 Show |
|||||||||||
accesslabs.net | yes | no | yes | yes | no | yes | 2048 | no | Edit | ||
Number of edits: 1 Show |
|||||||||||
accesslabs.org | yes | no | yes | yes | no | yes | 2048 | no | Edit | ||
Number of edits: 1 Show |
|||||||||||
aclu.org | no | not applicable | no | no | not applicable | not applicable | no | Edit | |||
Number of edits: 1 Show |
|||||||||||
adobe.com | yes | yes | yes | yes | no | yes | 2048 | yes | Edit | ||
Number of edits: 3 Show |
|||||||||||
alibaba.com | no | not applicable | not applicable | not applicable | not applicable | not applicable | - | not applicable | Edit | ||
Number of edits: 2 Show |
|||||||||||
aljazeera.com | no | not applicable | not applicable | not applicable | not applicable | not applicable | NA | no | Edit | ||
Number of edits: 1 Show |
|||||||||||
amazon.com | yes | not applicable | no | no | yes | 1024 | no | Edit | |||
Number of edits: 3 forcing https is actively prevented. Show |
|||||||||||
amazon.fr | no | yes | yes | yes | yes | yes | 2048 | yes | Edit | ||
Number of edits: 7 Show |
|||||||||||
Name | Uses HTTPS on Some Pages | Free of Mixed Content | Uses HTTPS on All Pages |
All Identifying Information Encrypted | Only Uses Secure Cookies | Has a Valid SSL Certificate | Key Size | Uses HSTS | Edit Entry | Show Notes |
More Information & Other Resources
Technical Information
- Jacob Appelbaum's Duraconf secure configuration files
- How to Implement HTTPS Correctly White Paper Part I
- How to Implement HTTPS Correctly White Paper Part II (coming soon)