Some people might want to force HTTP for server resources / SEO reasons.

However, some people might not. There are legitimate use cases where you want to force logged-in users to use HTTPS but leave anonymous people the choice to browse over an encrypted connection. Releases before 1.0-beta1 had that.

I implemented this as an option - but am not very inspired about giving a long description on the reasons to en/disable this, or opinionated on the default value. I just set it to 'off' because then the variable doesn't need to be set.

(This is a radio button only because you used a radio button for another on/off value on the page too. And I could conceivably see extra options, like "only force user agents known to be crawlers, to use HTTP")

CommentFileSizeAuthor
session443_no_force_http.patch2.44 KBroderik

Comments

dalin’s picture

Status: Needs review » Postponed (maintainer needs more info)

Can you shed some light on what these "legitimate reasons are"? I'd rather not make the module more complicated than it needs to be. If you have some special case that realistically only applies to your site then you can call session443_set_page_should_be_secure() from a custom module (see the docbook comments for details).

roderik’s picture

People wearing tin foil hats who think the world is a police state and the NSA is spying on them, basically. I cater to some.

Then again... who's to say what is 'tin foil hat' and what is 'legitimate security concern'? (In The Netherlands, there is currently general concern about mobile telco's using Deep Packet Inspection techniques to determine what data services customers are using, and block some services like Skype. ISPs are looking into data packets, which has people worried - and not all these people are conspiracy theorists. Some are politicians.)

The basic principle is:
HTTPS encryption is meant to protect information inside a connection from prying eyes on the network.
Your module is (seemingly) taking the stand point that only logged-in users may send/receive info that needs this protection. But some people may want to protect e.g. the exact contents of comment/contact forms they fill in on a site, or even their exact browsing history, from e.g. their employer's (potential) data sniffing equipment.

......
but I'll look into your suggestion / the docbook comments sometime, and replace my patch with that.
(I'll need to do more testing to understand everything, anyway -- because on one of my servers, logged-in users going to a HTTP link are automatically redirected to HTTPS again. And on another one, they can just browse HTTP (and appear logged-out) and HTTPS (and appear logged-in again). No idea why :) )

dalin’s picture

Assigned: Unassigned » dalin
Status: Postponed (maintainer needs more info) » Reviewed & tested by the community

Okay, fair enough. I'll roll your patch in before the next release.

The situation that you describe with authenticated users hitting HTTP is up for discussion here:
#1169166: How to handle authenticated users hitting HTTP pages

dalin’s picture

Assigned: dalin » Unassigned
Status: Reviewed & tested by the community » Fixed

Work based on your patch is in the dev version. If you've got time to test it would be much appreciated.

I've actually come completely about face in my opinion of this. I now love the idea. It makes this module the complete HTTPS solution (i.e. it now encompasses everything that Secure Pages module does).

Vc Developer’s picture

Will this feature be in your D7? I notice the pub date of D7 is Feb 25.

dalin’s picture

Yes. The D6 version is a complete rewrite of the early alphas. First step is to get it stable, then fore-port it to D7.

Vc Developer’s picture

Kewl! :)

roderik’s picture

Works for me. Thanks.

Status: Fixed » Closed (fixed)

Automatically closed -- issue fixed for 2 weeks with no activity.