aboutsummaryrefslogtreecommitdiff
path: root/doc/bugs/Login_should_redirect_to_secure_version_of_site.mdwn
blob: ae53fc5b3eb3c4d77dda49274b067e4dd57560b5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Steps to reproduce:

1. visit an ikiwki site like <http://ikiwiki.info/> or <http://git-annex.branchable.com/>
2. trigger the login page by accessing preferences or trying to edit something
3. login page is served without encryption

Firefox gives all kinds of warnings for unencrypted login pages.

The fix is for the login page to redirect to the https version of the wiki before showing the login form.

> This is web server configuration for those sites, so not really a bug in the
> ikiwiki software. If you run an ikiwiki instance and you have a browser-trusted certificate,
> I would recommend:
>
> * setting the `url` and `cgiurl` options to `https://...`
> * configuring your web server (frontend web server if you are using a reverse-proxy)
>   to redirect from `http://...` to `https://...` automatically, possibly excluding
>   `/.well-known/acme-challenge/` to make it easier to bootstrap Let's Encrypt certificates
>
> In [ikiwiki-hosting](https://ikiwiki-hosting.branchable.com/) the latter can be achieved
> by setting the `redirect_to_https` option to `1`.
>
> When not using ikiwiki-hosting, the ikiwiki software does not control the web server
> configuration, so it can't do this for you. The CGI script could redirect from http
> to https if it knew you had a browser-trusted certificate, but it can't know that
> unless you tell it (by setting `url` and `cgiurl`), and there's the potential for
> infinite redirect loops in misconfigured reverse-proxy setups if it did that
> (see [[bugs/login problem redux]]), so I think this is better solved at the web
> server level.
>
> The operator of ikiwiki.info and branchable.com can change the web server
> configuration for those sites, but other ikiwiki developers can't. --[[smcv]]