HTTPS Everywhere Atlas

Embedded content loaded from third-party domains (for example, YouTube, Google Analytics, ad networks, or CDNs) may also be affected. You can test this by loading the web page in question in a browser with HTTPS Everywhere installed and pulling down the HTTPS Everywhere rules menu. This will show a list of HTTPS Everywhere rules that were applied as the page was loaded, including rules that might have affected embedded content from other domains.

The stable (as yet unreleased) branch contains the following rule that is enabled by default:

<!--
	Invalid certificate:
		chat.nexedi.com
		jabber.nexedi.com
		mail.nexedi.com

	Redirect to HTTP:
		8marta2013.glavbukh.ru
		den.glavbukh.ru

	Refused:
		backup.nexedi.com
		frontend5.nexedi.com
		frontend15.nexedi.com
		frontend16.nexedi.com
		frontend25.nexedi.com
		octopus.nexedi.com
		vibox.nexedi.com
		vpn.nexedi.com
		www.fr.nexedi.com
		_jabber._tcp.nexedi.com
		_xmpp-client._tcp.nexedi.com
		_xmpp-server._tcp.nexedi.com

	Time out:
		conference.nexedi.com
		dedibox.nexedi.com
		demo.nexedi.com
		frontend2.nexedi.com
		frontend13.nexedi.com
		frontend23.nexedi.com
		frontend24.nexedi.com
		frontend28.nexedi.com
		mail2.nexedi.com
		ns.nexedi.com
		oasis.nexedi.com
		aubox.oasis.nexedi.com
		dls.oasis.nexedi.com
		erp5devel.oasis.nexedi.com
		kotoba.oasis.nexedi.com
		jebox.oasis.nexedi.com
		nexedi.oasis.nexedi.com
		newredd.oasis.nexedi.com
		redd.oasis.nexedi.com
		reddcore.oasis.nexedi.com
		rentalinux.oasis.nexedi.com
		robox.oasis.nexedi.com
		sebox.oasis.nexedi.com
		tinyleon.oasis.nexedi.com
		tsx.oasis.nexedi.com
		portal.nexedi.com
		sd-3173.nexedi.com
		sd-3174.nexedi.com
		sd-948.nexedi.com
		voice.nexedi.com
		vpn.voice.nexedi.com
--><ruleset name="nexedi.com">
	<target host="nexedi.com"/>
	<target host="www.nexedi.com"/>
	<target host="caucase.nexedi.com"/>
	<target host="cloudooo.nexedi.com"/>
	<target host="cribjs.nexedi.com"/>
	<target host="erp5.nexedi.com"/>
	<target host="frontend1.nexedi.com"/>
	<target host="frontend3.nexedi.com"/>
	<target host="frontend9.nexedi.com"/>
	<target host="frontend10.nexedi.com"/>
	<target host="frontend14.nexedi.com"/>
	<target host="frontend26.nexedi.com"/>
	<target host="frontend27.nexedi.com"/>
	<target host="frontend29.nexedi.com"/>
	<target host="frontend30.nexedi.com"/>
	<target host="ielo01.nexedi.com"/>
	<target host="jio.nexedi.com"/>
	<target host="lab.nexedi.com"/>
	<target host="nayuos.nexedi.com"/>
	<target host="neo.nexedi.com"/>
	<target host="officejs.nexedi.com"/>
	<target host="osoe-project.nexedi.com"/>
	<target host="re6st.nexedi.com"/>
	<target host="renderjs.nexedi.com"/>
	<target host="shacache.nexedi.com"/>
	<target host="slapos.nexedi.com"/>
	<target host="stack.nexedi.com"/>
	<target host="support.nexedi.com"/>
	<target host="test.nexedi.com"/>
	<target host="webrunner.nexedi.com"/>
	<target host="wendelin.nexedi.com"/>
	<target host="www2.nexedi.com"/>
	<target host="zabbix.nexedi.com"/>

	<rule from="^http:" to="https:"/>
</ruleset>

nexedi.com.xml    File a bug

The HTTPS Everywhere developers welcome corrections and updates to rules. Please see our developer information and documentation of the ruleset format. If filing a bug in the Tor Project's Trac bug tracker, you can use the shared username and password cypherpunks / writecode; please ensure that the bug is marked as applying to HTTPS Everywhere.

Information current as of:


current release a9c79875 2019-11-07 15:00:59 -0800;
next release 33860265 2019-12-09 04:21:45 +0000;