Comments on: 4 Good Reasons for Using HTTP/2 https://bloggeek.me/reasons-http2/ The leading authority on WebRTC Sat, 28 Dec 2019 15:14:36 +0000 hourly 1 By: Lennie https://bloggeek.me/reasons-http2/#comment-118271 Wed, 07 Oct 2015 07:31:22 +0000 https://bloggeek.me/?p=9933#comment-118271 In reply to Tsahi Levent-Levi.

While I can’t imagine them not doing that other than for technical reasons. One reason is that they are already experimenting with it: https://blog.cloudflare.com/test-all-the-things-ipv6-http2-sha-2/

But in practice it really doesn’t matter much.

Look at this blog, it’s already using SPDY. The protocol is very similar and the browser support is similar too. Pretty sure Cloudflare will implement HTTP/2 before browsers start dropping support for SPDY.

]]>
By: Tsahi Levent-Levi https://bloggeek.me/reasons-http2/#comment-118270 Wed, 07 Oct 2015 03:16:12 +0000 https://bloggeek.me/?p=9933#comment-118270 In reply to Steven Hambleton.

You and me both. I use Cloudflare here and can’t wait for them to add HTTP/2 support.

]]>
By: Steven Hambleton https://bloggeek.me/reasons-http2/#comment-118269 Wed, 07 Oct 2015 01:44:08 +0000 https://bloggeek.me/?p=9933#comment-118269 nginx will support HTTP/2 by end of this year so hopefully Cloudflare will too!

]]>
By: Lennie https://bloggeek.me/reasons-http2/#comment-118268 Tue, 06 Oct 2015 10:36:05 +0000 https://bloggeek.me/?p=9933#comment-118268 In reply to Tsahi Levent-Levi.

I almost feel guilty that I don’t yet have any suggestions on what is the best HTTP/2 server or proxy for different situations 😉

But the list is here:
https://github.com/http2/http2-spec/wiki/Implementations
http://www.haproxy.org/ is also useful it can determine the type of protocol and route to the right server.

]]>
By: Lennie https://bloggeek.me/reasons-http2/#comment-118267 Tue, 06 Oct 2015 10:20:34 +0000 https://bloggeek.me/?p=9933#comment-118267 In reply to Tsahi Levent-Levi.

No problem. Technology isn’t always easy and encryption is one of those technologies.

I forgot to mention https://letsencrypt.org/ is going to start their beta program soon. It’s really exciting. 🙂

They will allow you to have not only free certificates, but in an automated way.

This should really help with the burden of deploying HTTPS, because for example you don’t need to talk to different people in your organization to get your certificates, don’t need to worry about the certificates expiring (it automatically renews) and their tooling configures your server with the right settings.

]]>
By: Tsahi Levent-Levi https://bloggeek.me/reasons-http2/#comment-118266 Tue, 06 Oct 2015 10:07:55 +0000 https://bloggeek.me/?p=9933#comment-118266 In reply to Lennie.

Lennie,

I had a hunch you’ll share your suggestions here – thanks as always for the important feedback.

]]>
By: Lennie https://bloggeek.me/reasons-http2/#comment-118265 Tue, 06 Oct 2015 10:02:52 +0000 https://bloggeek.me/?p=9933#comment-118265 Deploying HTTPS can be a bit daunting because there are so many things you can do wrong.

Here are some tips for making it easier for people to deploy HTTPS (which you need for HTTP/2) without having to know all the details.

Tip 1: Install a recent Linux distribution on your server (these have the openssl version you’ll need with all the fixes and features). Or use containers (Docker or LXC) to add a mini Linux server with a recent distribution to your server (you might want to use it as a proxy in front of your real webserver).

Information on how to configure your server:
https://wiki.mozilla.org/Security/Server_Side_TLS
https://istlsfastyet.com/

Where to get some free certificates:
http://www.startssl.com/ (for personal websites/non-commercial ?)
https://www.globalsign.com/en/ssl/ssl-open-source/ (for open source projects)
https://www.ohling.org/blog/2015/02/wosign-free-2y-ssl-certificate.html (free certificates from China)

How to check if your HTTPS configuration is correct:
https://www.ssllabs.com/ssltest/

And you should occasionally re-check with the ssltest site so you know you are still doing it correctly, because what might have been considered secure today, might not be tomorrow.

]]>