• FreedomAdvocate@lemmy.net.au
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    4
    ·
    2 days ago

    Why are the immich teams internal deployments available to anyone on the open web? If you go to one of their links, like they provide in the article, they have an invalid SSL certificate, which google rightly flags as being a security risk, warns you about it, and stops you from going there without manual intervention. This is standard behaviour and no-one should want google to stop doing this.

    I was going to install linux on an old NUC to run immich some time soon, but think I might have to have a look to see if it has been audited by some legit security companies first. How do they not see this issue of their own doing?

    • chaospatterns@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      edit-2
      1 day ago

      It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

      If you don’t have them on the open web, developers and pull request authors can’t see the previews.

      The issue they had was being marked as phishing, not the SSL certificate warning page.

      • Nibodhika@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        3
        ·
        1 day ago

        It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

        So? What that has to do with SSL certificates? Do you think GitHub loses SSL when viewing PRs?

        If you don’t have them on the open web, developers and pull request authors can’t see the previews.

        You can have them in the open, but without SSL you can’t be sure what you’re accessing, i.e. it’s trivial to make a malicious site to take it’s place an MitM whoever tries to access the real one.

        The issue they had was being marked as phishing, not the SSL certificate warning page.

        Yes, a website without SSL is very likely a phishing attack, it means someone might be impersonating the real website and so it shouldn’t be trusted. Even if by a fluke of chance you hit the right site, all of your communication with it is unencrypted, so anyone in the path can see it clearly.

        • Count042@lemmy.ml
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          1 day ago

          Yes, a website without SSL is very likely a phishing attack, it means someone might be impersonating the real website and so it shouldn’t be trusted. Even if by a fluke of chance you hit the right site, all of your communication with it is unencrypted, so anyone in the path can see it clearly.

          No, Google has hit me with this multiple times for sub domains where the subdomain is the name of the product and has a login page.

          So, for example, if I have emby running at emby.domain.com they’ll mark it as a phishing site. You have to add your domain to their web console and dispute the finding which is probably automated. I’ve had to do this at least three times now.

          All my certs were valid.

          • Nibodhika@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            Yes, Google has miss reported my websites in the past, all of which were valid, but the person I’m replying to seemed to assume no-SSL is a requirement of the feature, and he doesn’t understand that a wrong/missing SSL is indistinguishable from a Phishing attack, and that the SSL error page is the one that warns you about phishing (with reason).

      • FreedomAdvocate@lemmy.net.au
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        1 day ago

        The issue they had was being marked as phishing, not the SSL certificate warning page.

        Have you seen what browsers say when you have a look at the SSL certificate warning page?

        It is for pull requests. A user makes a change to the documentation, they want to be able to see the changes on a web page.

        Why is a user made PR publishing a branch to Immich’s domain for the user to see?

        • BCsven@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          15 hours ago

          I thought that was how pull requests worked, its a branch if you’veade a departure to edit code, you have the pull request and ask them to merge into the main branch. It should be visible to everyone so everyone can review the change.

    • yeehaw@lemmy.ca
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      2 days ago

      You could just host it inside your network and do an always on VPN. That’s what I do.

      • RheumatoidArthritis@mander.xyz
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 day ago

        Now imagine you’re running a successful open source project developed in the open, where it’s expected that people outside your core team review and comment on changes.

      • chaospatterns@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        How would that work? The use case is for previews for pull requests. Somebody submits a change to the website. This creates a preview domain that reviewers and authors can see their proposed changes in a clean environment.

        CloudFlare pages gives this behavior out of the box.