The certificate for is2.Jow Forums.org expired on 7/24/2019

>The certificate for is2.Jow Forums.org expired on 7/24/2019.

Thanks, Hiroshima Nagasaki

Attached: is2.png (811x738, 40K)

Other urls found in this thread:

userscripts.org/users/tearshed
boards.Jow
boards.Jow
boards.4channel.org/*
boards.4channel.org/*
greasyfork.org/en/scripts/25480-Jow
twitter.com/NSFWRedditVideo

this is preventing me from having fun on /gif/ and /jp/

thought i was the only one with this issue, just been on /qa/ and nothing there so i came here

>Windows

This is the type of people we share a board with.

I just came to Jow Forums to see if anyone was talking about this

IT IS A POSSIBLE MITM ATTACK DO NOT ADD AN EXCEPTION

reported on irc, I guess we just wait

Pretty much all the images get served from is2.Jow Forums.org too. Since Jow Forums.org is considered a NSFW site, mobile network providers block it and prevent you from expanding images. Although if you go to the image URL and change the domain to "i.4cdn.org", the images load fine without any restrictions.

I don't know why they bothered making the distinction between Jow Forums and 4channel if they won't even configure the site properly.

Same with me. Didn't see anyone else with this issue before this thread.
Workaround is to just change to non-secure http for now.

is this a regional thing?

>Workaround is to just change to non-secure http for now.
don't

>just change to the insecure version goy!
fuck off spook

He just doesn't give a shit about the site. We're still stuck without vp9/webp support for the same reason.

it only happened in the last hour (i guess it shows how many people use https also)

Isn't this how 2ch got taken over?

Cloverchads don't have this problem

Attached: 1563493216220.jpg (600x601, 275K)

I like the way the browser is all like "Oh no! The certificate has expired! It's now a security risk!" when in reality the security is just the same, the only thing that has changed is that it would be easier to MITM because you could serve up a false certificate that expired the same time and the user would be more likely to click it away.
But this could be simply solved by comparing to the previously received certificate, before it expired.

I wonder what kind of operating overhead certificate signing companies have. It can't be all that much.

You can just add an exception. You'll still have your trusted encryption. See

You have to (go back)

Nevermind that was domain renewal, not certificate renewal, I think

>webp
I will never stop repeating FUCK OFF with that stupid format
come back when your retarded "standard" conforms to the current status quo, including the strictly lossy/default lossless dichotomy that JPG/PNG have going
also VP9 still doesn't work correctly on all hardware

>Workaround is to just change to non-secure http for now.
What? No. Just accept and continue.
An expired cert will still encrypt your traffic. The expiry is just an arbitrary thing to get people to pay subscription models for cert renewal (and partly because by rotating certs you can reduce the likelihood one will be compromised while still in use).

how many lumen?

Are you saying only windows users will see this security message? I would figure it was tied to which browser you are using, not OS.
I see this as well OP. Using Opera.

is2.4chin.org certificate seems to be issued by let's encrypt (its free)

you can change the is2 to i.4cdn to load the images
below is the userscript i use. works perfectly
// ==UserScript==
// @name Jow Forums link fix
// @namespace userscripts.org/users/tearshed
// @description xx
// @include boards.Jow Forums.org/*
// @include boards.Jow Forums.org/*
// @include boards.4channel.org/*
// @include boards.4channel.org/*
// @version 0.0.1.20170126130036
// ==/UserScript==

function foo(a,b,c) {
var links, thisLink;
links = document.evaluate(
a,document,null,XPathResult.UNORDERED_NODE_SNAPSHOT_TYPE,null
);
for (var i = 0; i < links.snapshotLength; i++) {
var thisLink = links.snapshotItem(i);
thisLink.href = thisLink.href.replace(b,c);
}
}

foo("//a[contains(@href, 'is2.Jow Forums')]",'is2.Jow Forums.org/','i.4cdn.org/');
foo("//a[contains(@href, 'is.Jow Forums')]",'is.Jow Forums.org/','i.4cdn.org/');

It apparently expired on 11:41:56 AM GMT from the cert details. The fuck's with everyone letting certificates expire recently?

Nobody gives a shit about vp9 and webp, I JUST WANT HIM TO REMOVE GOOLAG CAPTCHA

Oh, then they'll just get a new one from Let's Encrypt.

I guess Let's Encrypt did a bunch of certs at once? Or they decided to have similar expiry dates to group the renewals together.

No

Let's Encrypt certs only last 6 months, it needs to be renewed regularly

Why is your code different from this code? And what's the difference?
greasyfork.org/en/scripts/25480-Jow Forums-link-fix/code

>Workaround is to just change to non-secure http for now.
Nice try, Schlomo

The cdn is using a free certificate from Let's Encrypt.

works on my Jow Forums-x :-)

dont listen to this faggot.
all is well.

>xpath for selecting element by attribute content
>a,b,c
>var
We will call you later.

It isn't different, just less repeated code.

>Why is your code different from this code? And what's the difference?
my code is more condensed. your link has blocks of repeated code when a function would fix the issue. that's why i rewrote the script

>caring this much about a 4chins script

give me a booty call

4chanx ignores it, at least.

This is what happens when the people who make specs conflate authentication and encryption. Can I just have a simple encrypted transport without getting happy merchants like Verisign involved? I don't need to pay moneys for a certificate to use SSH.

It works fine on mobile devices. Anyone who hasn't complained is probably a phoneposter.

All these other posters added exceptions?

its likely only 20% of users use https by default (and they are all in this thread)

Yeah, images are refusing to load because they are insecure now.

Hacker detected

why does Jow Forums store the SAME image in i.4cdn and is2.Jow Forums?

Attached: 1563930805533s.jpg (250x247, 4K)

this is Jow Forums, right?

Attached: 85364630.jpg (636x632, 33K)

now that Lets Encrypt exists I really wonder why commercial CAs still exist

He's right though, that's a very bad practice. Imagine yourself going back on your code 3 months later & trying to recall "what was that b & c again"? Nightmarish when your enterprise's code has tons of different classes filled with this & they want you to refactor it. (Benn there)

ffs

magic

some boards use one server, while others use the other one, or maybe just to have redundancy, who knows

>Can I just have a simple encrypted transport without getting happy merchants like Verisign involved?
Sure, you just have to add exceptions.
It's a trust system... Wait a second, why don't we blockchain SSL certificates?

Nice try. HTTPS stays on.

i.4cdn.org seems to be working tho

Attached: 4cdn.jpg (1920x1040, 313K)

aaand nobody cares.
big oof

user...

load balancing?

glowing that much

SSL is platform-agnostic, bitch.

What's wrong with:
a = document.getElementsByTagName("a");
for(i = 0; i < a.length; i++){
if(a[i].getAttribute("href").includes("//is")){
a[i].setAttribute("href", a[i].getAttribute("href").replace("//is2", "//is").replace("//is", "//i").replace("Jow Forums", "4cdn"));
}
}


Am I retarded?

>Workaround is to just change to non-secure http for now.
Holy shit, ISHYGDDT.
Just

Based retard
Have sex

it if it works it's fine

>SSL makes everyone more secure they said
>expiries and forced to use unsafe workaround all the time

webp is garbage. I hope Jow Forums never supports it.

I get that it's fine, just seemed like tearshed overcomplicated things and I wanted to know if there was a reason for doing so.
Did some performance.now() testing and his was faster, so perhaps that's why.

>Did some performance.now()
can you post the benchmark/code?

>is fixed
thanks moot

Who?

>come on! It's nothing, man! Just continue like nothing while your GPU starts spinning like crazy and your electricity bill drives you to bankruptcy and suicide!
No, thanks.

>fixed
>just made all images default to i.4cdn

Oh hiro.
You so kawaii~.

Attached: facepalm__.gif (320x251, 1.55M)

Attached: Screenshot_2019-07-24 g - Technology - 4chan.png (900x600, 87K)

I thought this was /installgentoo/

Why is this important you don't send any sensitive data to Jow Forums and for Jow Forums pass users I think the payment isn't processed by Jow Forums the only downside here is someone (maybe) intercepting you posts

this got magically fixed

Hi hiro if you're watching the thread.
Please be my gf (male) or I will destroy Jow Forums.

Attached: yandere_3.jpg (590x674, 117K)

>Workaround is to just change to non-secure http for now.
this is the most amerimutt thing i've ever heard

Attached: 1434050997213.jpg (386x363, 38K)

kek, i knew it was too quick of a fix

>Workaround is to just change to non-secure http for now.
go away, glowing nigger

Attached: 1562440145024.png (1754x1240, 1.42M)

You need to cool it with the antis-emitism, guy

ad money.
advertisers don't care where the images get loaded from, they just dont want porn visible on the domain where ads are

>I guess Let's Encrypt did a bunch of certs at once? Or they decided to have similar expiry dates to group the renewals together.

Let's Encrypt is a self certificate. You run a script on your server and it signs it for you, there is no third party involved in issuing or renewing. You control it all.