Radish alpha
r
rad:z4V1sjrXqjvFdnCUbxPFqd5p4DtH5
Radicle web interface
Radicle
Git
Connect to `.onion` names via HTTP instead of HTTPS
Merged lorenz opened 1 year ago

While it is technically possible to serve onion services via HTTPS using TLS certificates that are signed by a “proper” CA, it is the exception, not the norm.

The benefit of TLS certificates for .onion is authentication: Users can (by trusting some CA) ensure that they are indeed communicating with the service they would like to. In Radicle, this is not that big of a deal, because we have DIDs and signatures in the application layer.

Also, setups I have seen so far are more “ad hoc”, and people would probably tend to self-sign their certificates, which would cause validation in browsers to fail anyway.

See also:

lorenz opened with revision 1be0bec8 on base a609fe19 +6 -1 1 year ago

While it is technically possible to serve onion services via HTTPS using TLS certificates that are signed by a “proper” CA, it is the exception, not the norm.

The benefit of TLS certificates for .onion is authentication: Users can (by trusting some CA) ensure that they are indeed communicating with the service they would like to. In Radicle, this is not that big of a deal, because we have DIDs and signatures in the application layer.

Also, setups I have seen so far are more “ad hoc”, and people would probably tend to self-sign their certificates, which would cause validation in browsers to fail anyway.

See also:

rudolfs pushed revision 2 9aafd0d6 on base bd551911 +6 -1 1 year ago

Rebase.

rudolfs commented on revision 2 1 year ago

Nice. Just gonna see if this breaks anything.

check check-visual check-unit-test check-httpd-api-unit-test check-e2e check-build 👉 Preview 👉 Workflow runs 👉 Branch on GitHub

lorenz pushed revision 3 6f1e7644 on base bd551911 +9 -3 1 year ago

npm run format

rudolfs merged revision 6f1e7644 at fb32e01a 1 year ago