Please revert forced https redirect
In your latest update you have specified this bug fix.
5. Bug Fixed
Reduced potential security risks by forcibly redirecting HTTP requests and responses to HTTPS ones.
This is not infact a bug fix. This is forcing people to do something they do not wish to do.
I'm using traefik infront of my omada controller, and it (well cert manager) handles my ssl termination.
I do not need omada to force https traffic with insecure https certificates.
I understand that https is more secure, but as you have the option, i think this should be reverted since this only makes things more difficult.
Cert manager handles my certs just fine, i dont need to worry about them expiring, like i would if i would need to manually update them every 90 days.
As a selfhoster, who enjoys omada controller, do not take the option of http away.
- Copy Link
- Subscribe
- Bookmark
- Report Inappropriate Content
- Copy Link
- Report Inappropriate Content
Hello, I would like to echo the request to revert this change. I was very surprised to upgrade my controller to see my system broke and that the reason was a "bug fix" that makes it so a still existing settings option is now totally ignored and non-functional. Is this a an internal misalignment issue potentially? The settings menu still shows the setting to disable Redirect HTTP to HTTPs, so I would imagine this is an accidental regression and not a socialized change in direction?
Regardless, being able to selfhost without fear of the vendor changing rules or trying to aggressively push their cloud manager is the reason I choose TPLink over brands like Ubiquity. Being able to do my own SSL termination is essential to this.
Thank you for your help.
- Copy Link
- Report Inappropriate Content
- Copy Link
- Report Inappropriate Content
This change is being implemented primarily for security reasons. Moving forward, we will no longer support HTTP requests. This decision aligns with the broader industry trend, as the number of websites that still rely on HTTP is rapidly declining. HTTPS, which stands for Hypertext Transfer Protocol Secure, has become the standard for secure communication over the internet. It encrypts data between the user's browser and the website, significantly reducing the risk of data breaches, eavesdropping, and other security vulnerabilities. As more organizations and platforms prioritize security and user privacy, HTTPS is increasingly becoming the norm. This shift not only enhances security but also builds trust with users, as they can be confident that their data is being transmitted safely. Therefore, adopting HTTPS is not just a best practice—it's a necessary step to stay aligned with the evolving digital landscape and to ensure a secure and reliable user experience.
Thanks for your understanding.
- Copy Link
- Report Inappropriate Content
I agree with everything you said if you are referring to internet facing applications.
However, many of us run the controller on a local only environment and, in this case, it makes no sense whatsoever to enforce https.
Even in the case that you expose your controller to the internet, the typical use case involves a reverse proxy handling the https communication with the outside while the application itself is still only available for local access. It also makes no sense for the app to use https in this case.
At least provide an option in the controller to toggle this feature like you already do for the portal.
- Copy Link
- Report Inappropriate Content
I also agree, that yes, HTTPS is the one you need. That is why i'm using Traefik, and cert-manager to handle all my SSL-certificates. But again, you are forcing people to use HTTPS, and you are actually forcing people to use insecure-https, since the certificate omada generates, is self-signed, it is not trusted unless you allow it. So in fact, this is bad security since you are making people trust insecure-certificates.
And again, as anyone with proper management of certificates, does not handle them in-app, but manages them in other ways. And again, you do not even offer ways to update certificates via cli, or similar ways, so that we could inject our own certificates inside the application. This means that depending on the way we update and use certificates, we would need to manually start updating them.
So youre making everyones lives worse, with this change.
* People need to trust self-signed certificates, which are not infact, secure, and cause people to accept what ever certificates, since let's faceit, people do not understand what it means to have self-signed certificate. And those that do understand, will not use it but use their own.
* People who have certification management, outside of the app, are left in the dust, as they need to start manually updating certificates in app, uploading them and setting reminders, instead of automating certificate updates.
* You do not offer anykind of a way, to update certificates automatically, so that people who do have certificate-management in their software, k8s-kluster, could inject the certificates in the application on deployment via initcontainer or similar mechanism.
* And those who have centrally managed gateways, traefik, npm, caddy, which handles ssl-termination, actually have to make their servers more insecure, since they now need to implement a way to trust insecure (ie. self-signed) certificates in the case of omada.
So all in all, again, it should be that people can use http, if they so wish, and people who wish to use your software, and upload certificates there, can use the https. But again, i'm now forced to update my traefik, to be more insecure, by accepting insecure https certificates due to this change.
- Copy Link
- Report Inappropriate Content
Hi
Thank you for your valuable advice. Indeed, what you’ve said makes a lot of sense. I have already conveyed your concerns and thoughts to our R&D department, and they are currently reconsidering it. As soon as there is an outcome from their deliberations, I will update you promptly. Thank you.
- Copy Link
- Report Inappropriate Content
Information
Helpful: 5
Views: 238
Replies: 7
Voters 1
