▲ | tptacek 4 days ago | |||||||||||||||||||||||||
Just add the self-signed certificate. It's literally a TOFU system. | ||||||||||||||||||||||||||
▲ | jchw 4 days ago | parent | next [-] | |||||||||||||||||||||||||
But again, you then get (much) worse UX than plaintext HTTP, it won't even remember the certificate. The thing that makes TOFU work is that you at least only have to verify the certificate once. If you use a self-signed certificate, you have to allow it every session. A self-signed certificate has the benefit of being treated as a secure origin, but that's it. Sometimes you don't even care about that and just want the encryption. That's pretty much where this argument all comes from. | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
▲ | PhilipRoman 3 days ago | parent | prev [-] | |||||||||||||||||||||||||
Not a TLS expert, but last time I checked, the support for limiting what domains a certificate is allowed to sign was questionable. I wouldn't want my router to be able to MITM any https connection just to be able to connect to it's web interface securely. |