Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HSTS Support #151

Closed
wants to merge 2 commits into from
Closed

HSTS Support #151

wants to merge 2 commits into from

Conversation

thom4parisot
Copy link
Contributor

In addition of the HTTPS redirect, adding HSTS support will even skip this redirect the next time a supporting browser asks for a non-secured resource.

We potentially gain an HTTP query per non-HTTPS requested resource and smoothly increased security and privacy.

The value is set accordingly to the recommended value in the spec.

If you agree with this proposal, the same change can be propagated in other boilerplate files (like Nginx etc.).

It's a follow-up of h5bp/html5-boilerplate#1365.

In addition of the HTTPS redirect, adding HSTS support will even skip this redirect the next time a supporting browser asks for a non-secured resource.

We potentially gain an HTTP query per non-HTTPS requested resource and smoothly increased security and privacy.

The value is set accordingly to the recommended value in the spec.

If you agree with this proposal, the same change can be propagated in other boilerplate files (like Nginx etc.).
@alrra
Copy link
Member

alrra commented May 29, 2013

@oncletom can you amend the commit and:

  • combine the code with the existing one
  • update the commit message to reflect the includeSubdomains addition

Thanks :)

@thom4parisot
Copy link
Contributor Author

Oh gosh, I did not even realize it was living one line below :-(

I'll do, thanks :-)

`includeSubDomains` is part of the recommended value in the original spec of HSTS.
@thom4parisot
Copy link
Contributor Author

I've updated the commit and also added a precision about includeSubDomains. It could generate bad behaviours if subdomains are not secured with HTTPS.

alrra pushed a commit that referenced this pull request May 29, 2013
The `includeSubDomains` optional directive allows the user to apply the
`HTTP Strict Transport Security` rule to all of the site's subdomains:
* http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-14#section-6.1
* https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security

Ref: #151
@alrra
Copy link
Member

alrra commented May 29, 2013

Merged in f25e498, thanks @oncletom.

@alrra alrra closed this May 29, 2013
alrra pushed a commit that referenced this pull request May 29, 2013
The `includeSubDomains` optional directive allows the user to apply the
`HTTP Strict Transport Security` rule to all of the site's subdomains:
* http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-14#section-6.1
* https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security

Ref: #151
@thom4parisot thom4parisot deleted the patch-1 branch May 29, 2013 11:50
alrra pushed a commit that referenced this pull request Jun 27, 2013
The `includeSubDomains` optional directive allows the user to apply the
`HTTP Strict Transport Security` rule to all of the site's subdomains:
* http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-14#section-6.1
* https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security

Ref: #151
alrra pushed a commit to h5bp/server-configs-apache that referenced this pull request Jul 26, 2013
The `includeSubDomains` optional directive allows the user to apply the
`HTTP Strict Transport Security` rule to all of the site's subdomains:
* http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-14#section-6.1
* https://developer.mozilla.org/en-US/docs/Security/HTTP_Strict_Transport_Security

Ref: h5bp/server-configs#151
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants