Talk:Downgrade attack

Page contents not supported in other languages.
Source: Wikipedia, the free encyclopedia.
WikiProject iconCryptography: Computer science Mid‑importance
WikiProject iconThis article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
MidThis article has been rated as Mid-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (assessed as Mid-importance).

HSTS summary wording

The article currently says "then the user agent will refuse to access the site over vanilla HTTP, even if a malicious router represents it and the server to each other as not being HTTPS-capable." but I wonder if this is poorly worded. As I understand HSTS it's more about the client side or user agent as this says. Which this text sort of implies but the server but seems to have the potential to mislead. The point of HSTS and MITM downgrade attacks on HTTPS at least as I understand it, is that it can be one sided. The server may refuse to accept HTTP connections (other than to tell the client to use HTTPS). But this may not help if the client (including any human element) is willing to connect over HTTP since the MITM can make the secure connection to the server and then forward this to the client as HTTP. Nil Einne (talk) 08:19, 30 March 2022 (UTC)[reply]

https

I'm only one person who had rather stay on the https page than any other. So what browser do I need to do just that 2600:6C5D:577F:BB0D:6005:670E:F34C:7F05 (talk) 15:45, 16 November 2022 (UTC)[reply]