I have a home server and I have some HTTP services running on it. I’m thinking if I should even bother with HTTPS, as I’m already using tail scale which should be peer-to-peer and encrypted. So I shouldn’t worry about any men in the middle.
Am I missing something?
It just feels wrong to work with non-S HTTP :(
HTTPS performs two duties.
Your VPN provides the former but not the latter. That said the odds of there being an issue in this regard are so slim as to be zero, so you’ll probably be fine.
It does though doesn’t it? since every device needs to be authorized by me first
It can still have issues with potential attacks that would redirect your client to a system outside of the VPN. It would prevent MitM but not complete replacement.
Yep! It all comes down to your attack surface and how paranoid you want to be.
How do you know you’re connecting to the server you think you’re connecting to? When you enter
http://myserver.local
into a web browser, for example, it does a DNS lookup to get an IP address. You’re assuming that that lookup returns the value you think it should. BUT if something has poisoned your DNS cache, added an entry to /etc/hosts, etc. that IP address could be some other server. Without a certificate being presented by the server you likely wouldn’t notice.But as I said - it’s pretty unlikely in your scenario. But something to understand better for other scenarios.