[www.kde.org] [Bug 492145] New: networkcheck.kde.org has HSTS enabled, which breaks captive portals if you ever visit it with HTTPS
forestbeasts
bugzilla_noreply at kde.org
Sat Aug 24 21:46:23 BST 2024
https://bugs.kde.org/show_bug.cgi?id=492145
Bug ID: 492145
Summary: networkcheck.kde.org has HSTS enabled, which breaks
captive portals if you ever visit it with HTTPS
Classification: Websites
Product: www.kde.org
Version: unspecified
Platform: Other
OS: All
Status: REPORTED
Severity: normal
Priority: NOR
Component: general
Assignee: kde-www at kde.org
Reporter: forestbeasts at brightfur.net
Target Milestone: ---
SUMMARY
networkcheck.kde.org has HSTS enabled, so if you ever visit it with HTTPS, your
browser will only try to load it with HTTPS, which breaks captive portals.
STEPS TO REPRODUCE
1. Visit https://networkcheck.kde.org.
2. Join a captive portaled wifi network (coffeeshop, etc.).
OBSERVED RESULT
https://networkcheck.kde.org has a certificate error.
EXPECTED RESULT
http://networkcheck.kde.org gets redirected by the captive portal to its own
login page.
SOFTWARE/OS VERSIONS
Linux/KDE Plasma: Fedora Linux 40
KDE Plasma Version: 6.1.4
KDE Frameworks Version: 6.5.0
Qt Version: 6.7.2
ADDITIONAL INFORMATION
This should be an easy fix – just turn off HSTS on networkcheck.kde.org. (This
won't help people who've already visited it with HTTPS, but eventually the HSTS
will expire and they'll be fine.)
You can tell HSTS is enabled by running `curl -v http://networkcheck.kde.org`
and looking for the Strict-Transport-Security header.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the kde-www
mailing list