-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How to not expose via
in header ?
#185
Comments
The Heroku support might be able to offer solutions, or services like cloudflare or fastly could mask such a value, but the code as written leaves no room for alternatives. |
Do you have a source on that? I'd be curios, in particular because reverse proxy Caddy does not seem to add that header.
I believe you mean "security by obscurity" (which can help but is not a fix), but not privacy. |
It was part of RFC 2068
It was still present in RFC 7230 (and the relevant segment is still in 9110) except it made it optional on responses—which had escaped me—but Vegur had its development started in 2014, before or concurrently with RFC 7230 becoming standard and was still in sync with RFC 2038:
at this point in time I don't believe Heroku still uses Vegur in production though, but I haven't worked there in 8+ years. |
@ferd interesting, thanks! |
Looks like wappalyzer able to detect the heroku apps by checking the
via
header:https://github.com/AliasIO/wappalyzer/blob/7b54cb8487350a5d5ea95d02414f83ce3cd06cd1/src/technologies/h.json#L341-L357
Is there any possibility to not expose that header or any other info from heroku ?
This is kinda of privacy issue
The text was updated successfully, but these errors were encountered: