Senator Schumer Fails To Properly Use HTTPS On His Own Site, After Pushing Other Sites To Use It [Updated]

from the ooooops dept

This is just lovely. We just wrote about how Senator Chuck Schumer was pressuring websites to use https instead of http, saying (not really accurately) that http has a “security flaw.” However, gojomo pointed out in a comment on that post that Schumer’s own page, when you hit it via https at https://schumer.senate.gov/ reports:

“schumer.senate.gov uses an invalid security certificate.”

Ooops. Both Firefox and Chrome warn you not to proceed, because the connection is “untrusted” or “might not be the site you are looking for.” Obviously, this is probably just a small technical error by Schumer’s tech staff, but it does look pretty bad when he’s out there grandstanding on https. Of course, this isn’t to diminish that https is a useful tool that many websites should use to protect users, but it’s not clear that we want politicians telling websites what protocols to use (especially when they haven’t quite figured them out themselves).

Update: Some great points in the comments highlighting that Schumer and his staff don’t control the tech behind his Senate website, and any such cert would have to be controlled by the Senate IT folks. Also they pointed out that Schumer’s Senate site does not appear to take user info/logins so HTTPS wouldn’t much matter. However, his personal/campaign site does appear to take info and also does not use HTTPS.

Separately, others pointed out that one of the sites he called out — Amazon — does use HTTPS when you login and/or order, and his calling them out suggests they’re unsafe when it appears they are safe.

Filed Under: ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Senator Schumer Fails To Properly Use HTTPS On His Own Site, After Pushing Other Sites To Use It [Updated]”

Subscribe: RSS Leave a comment
29 Comments
Anonymous Coward says:

You don’t have permission to access / on this server.

There isn’t anything on the secure server. It’s a dead address. His site isn’t “secure” in that manner, so it isn’t surprising it doesn’t work.

That and the fact that the certificate would be controlled by senate.gov, and not the senator or his staff.

Anonymous Coward says:

Re: Re: Re:

HTTPS is not security anyway. It’s a false sense of security. Ask the OpenBSD people, they’ll lecture you about it. There’s still ways “around” it, and/or if you hack your way into the machine to replace it, etc…

It’s like putting an electronic lock on your car.. it might help if you lose the key, but down the line, someone can still steal your car with fairly low-tech tools.

Anonymous Coward says:

Re: Re: Re:

Not really. senate.gov ‘s certificate gets pulled when you pull any third level (there is that pesky reason why third levels are not the same). So you can https any of the individual sites, and get the same reaction. It’s as much a browser fault as anything else. I don’t think that Mr Schumer had any https site specifically setup.

Jon B. says:

Right, I’m pretty sure his staff doesn’t control senate.gov, and as such wouldn’t be able (unilaterally anyway) set up a cert for schumer.senate.gov. And it’s not link someone linked to https://schumer.senate.gov – some guy just went and tried to access it in response to the article from earlier this morning. It’s no surprise at all the server isn’t configured to serve individual officials’ subdomains as HTTPS. They *could* get a *.senate.gov cert, but there’s good reasons not to do that, too.

I’m not a fan of the guy but I don’t know why we’re giving him grief over something he can’t control. It’s apparently based on him ‘recommending’ something and therefore might speculatively push for legislation in some regard. I dunno. Maybe I missed something.

blah says:

https is broken

Rather than promoting https as the way to solve security problems (really, I would promote it as a way to help solve privacy issues, tbh) – perhaps we should actually fix it first.

https and SSL are a great way for a small number of Certificate Authority companies to make a boatload of cash for doing very little. I wouldn’t be surprised if Verisign approached this guy and lobbied for this.

Jeff Kim (profile) says:

CDNetworks provides last mile HTTPS feature

CDNetworks protects its customers from the Firesheep security threat with a ?last-mile-secure? feature within its Content Acceleration SSL product. This innovative solution requires no changes to the websites of CDNetworks? customers. Instead, CDNetworks communicates with websites in clear HTTP, and then transforms their responses to end users via SSL over HTTPS. This renders the Firesheep plug-in completely ineffective.

http://www.businesswire.com/news/home/20101104005744/en/CDNetworks-Protects-Firesheep-Last-Mile-Secure-Feature

Dean Landolt (profile) says:

Mike, I love you man, but you’re really out of your element here. It’s already been pointed out how Schumer’s staff wouldn’t control the cert, and that it’s a dead endpoint anyway, and that (surprisingly!) the senator is actually *correct*…

But more importantly: if you understood the attack vector in question you’d understand that it is only really relevant for hijacking user sessions in progress. If you’d looked at the port 80 version of the site you may notice the lack of a login feature anywhere, thus your complaint is completely baseless. In this case you’re the one doing the grandstanding.

Steven (profile) says:

This is why I love Techdirt

This is one of the reasons I love this site. In no time at all the commenters have basically nailed Mike on several different points and added much more information to the story. The folks here don’t seem to have much of a ‘follow whatever Mike says’ tendency.

While I don’t think this is really a story I do think this is an anecdotal situation of a much larger problem. Politicians just deciding to get involved in situations the government has no reason to be in.

JH says:

Since there aren’t any forms on Schumer’s site that prompt users for personal info AFAICT, HTTPS doesn’t really seem necessary to me.

What does bother me about this is it seems like defamation for Schumer to call out Amazon specifically when Amazon already uses HTTPS for sign-in and checkout. People who don’t know the details of SSL are going to hear this and think they aren’t safe shopping on/signing into Amazon at all. This could boil down to a loss of business for Amazon if people take this as “Amazon is insecure”. I’m not sure what else Schumer wants from Amazon. Does he want browsing of the site to be done through HTTPS as well? If so then Mike is correct, Schumer’s site should be protected by HTTPS too. If he’s really concerned about HTTPS he could redirect http://schumer.senate.gov (which others have pointed out he most likely has no control over) to https://chuckschumer.com/ (which I’m sure he has control over)

Actually…looking at chuckschumer.com there is a place to submit your email address and zip code, and there is no secure option…

Mike Masnick (profile) says:

Re: Re:

What does bother me about this is it seems like defamation for Schumer to call out Amazon specifically when Amazon already uses HTTPS for sign-in and checkout. People who don’t know the details of SSL are going to hear this and think they aren’t safe shopping on/signing into Amazon at all. This could boil down to a loss of business for Amazon if people take this as “Amazon is insecure”.

Good point.

Schumer’s site should be protected by HTTPS too. If he’s really concerned about HTTPS he could redirect http://schumer.senate.gov (which others have pointed out he most likely has no control over) to https://chuckschumer.com/ (which I’m sure he has control over)

Also a good point.

mirradric says:

Re: https is misunderstood

actually https IS used for authentication and this authentication is in fact a very important part of https. The catch is that the party being authenticated is the web server, rather than the client/end user, by way of it’s certificate.
This is a very important step in preventing a man in the middle attacks. After all, if you have been talking to the wrong party to begin with, no amount of encryption will help you.
This authentication is supposed to be provided by the certificate authorities which signs the individual server certificates to create a “web of trust”. Of course, there are other ways to determine that certificates (like self signed ones) are valid (like issuing your own certificate authority cert, compare fingerprints etc.). If such arrangements for verifying the certificate are in place, using the certificate is perfectly safe, even if it is self-signed or details such as domain name are wrong.

Ray Trygstad (profile) says:

Federal Certificate Authorities

The federal government maintains an entire infrastructure of their own Certificate Authorities, none of which are recognized by the folks who make the browsers. As a retired Naval Officer, I access DOD sites all the time and find that my browser is constantly warning me about these sites. One time I attempted to download and install certificates for all of the DOD CAs but locating them all, downloading them and installing them took me about two hours and I swore I’d never do it again.

Dean Landolt (profile) says:

Mike

I’m glad to see you updated the article — but the update is *still* inaccurate. I probably should have been more clear about this in my first comment — the problem isn’t whether sites use SSL during the login or payment phases (this is been considered a best practice for years now). You’ve got to use SSL for the lifetime of the session, at the _very_ least for users on unencrypted wifi where MITM attacks have been made so very easy by tools like firesheep.

Since there’s no way to know which users are on coffee shop wifi it is now considered a best practice to push everyone to SSL. If you don’t believe me download firesheep and see what you can get away with on another user’s amazon account. You may not be able to buy anything but you’ll be able to do quite a bit of damage.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...