I recall that subdomains are their own record inside a DNS, which would imply that anyone can claim that their server is a non-existent subdomain of the real domain

  • redpotatoes@lemm.ee
    link
    fedilink
    English
    arrow-up
    17
    ·
    edit-2
    6 months ago

    They’d need a certificate authority to issue the certificate, and the victim’s browser would have to trust that authority.

    Edit: and the scammer would need to control the domain DNS server to use the subdomain, like another reply said, so the certificate alone wouldn’t help much.

        • Elvith Ma'for@feddit.org
          link
          fedilink
          arrow-up
          1
          ·
          6 months ago

          Checks own servers

          Strict-Transport-Security: max-age=63072000; includeSubDomains; preload

          Yeah, I’d like to see that…

            • Elvith Ma'for@feddit.org
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              6 months ago

              Yeah, but now you’re talking about communicating with web.archive.org and not nonesense.reputable-bank.com as in the original post. In this case you’re not even trying to hide the fact, that you aren’t affiliated with reputable-bank.com and we’re back to square one and you could also just use reputable-bank.com.some.malicious-phishing.website to host your page.

              Btw: all modern browsers will warn you when you access a non-encrypted website - some immediately, some only when you try to enter data into a login form.

          • Serinus@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            6 months ago

            All that does is allow someone in the middle to potentially read your traffic. So what’s secret about the traffic between you and the Internet archive? If it’s only your login details, that seems like a you problem.

            It wasn’t long ago that most of the internet was http only.