This is the talk page for discussing improvements to the Downgrade attack article. This is not a forum for general discussion of the article's subject.
This article is written in American English, which has its own spelling conventions (color, defense, traveled) and some terms that are used in it may be different or absent from other varieties of English. According to the relevant style guide, this should not be changed without broad consensus.
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects:
This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.InternetWikipedia:WikiProject InternetTemplate:WikiProject InternetInternet articles
This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptographyWikipedia:WikiProject CryptographyTemplate:WikiProject CryptographyCryptography articles
The article currently says "then the user agent will refuse to access the site over vanilla HTTP, even if a malicious router represents it and the server to each other as not being HTTPS-capable." but I wonder if this is poorly worded. As I understand HSTS it's more about the client side or user agent as this says. Which this text sort of implies but the server but seems to have the potential to mislead. The point of HSTS and MITM downgrade attacks on HTTPS at least as I understand it, is that it can be one sided. The server may refuse to accept HTTP connections (other than to tell the client to use HTTPS). But this may not help if the client (including any human element) is willing to connect over HTTP since the MITM can make the secure connection to the server and then forward this to the client as HTTP. Nil Einne (talk) 08:19, 30 March 2022 (UTC)[reply]