Bug 7948 - Web Access doesn't send Strict-Transport-Security header
Summary: Web Access doesn't send Strict-Transport-Security header
Status: NEW
Alias: None
Product: ThinLinc
Classification: Unclassified
Component: Web Access (show other bugs)
Version: trunk
Hardware: PC Unknown
: P2 Normal
Target Milestone: LowPrio
Assignee: Bugzilla mail exporter
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-06-16 08:00 CEST by Pierre Ossman
Modified: 2022-12-12 11:18 CET (History)
1 user (show)

See Also:
Acceptance Criteria:


Attachments

Description Pierre Ossman cendio 2022-06-16 08:00:57 CEST
HTTP has an addition called "Strict Transport Security" (commonly abbreviated HSTS) that is intended to mitigate man-in-the-middle attacks by having the browser know that a site should never be accessed without TLS¹.

It would be beneficial if Web Access could use this feature to increase the security for users.

The main blocker for this is that enabling it affects every service with the same host name². That means if Web Access is running on port 300 and enables this, then browsers will refuse to communicate without TLS with another web server running on e.g. port 80 on the same machine.

As such, we cannot add this unconditionally. It must be a configuration option that is enabled, only when the side effects are acceptable.

¹ Supposedly also never with a certificate exception
² The recommendation is also to enable it for all subdomains, exacerbating the problem
Comment 1 Pierre Ossman cendio 2022-06-16 08:03:23 CEST
Also note that HSTS has a major design flaw; it only works if the browser has visited the site before. Otherwise, it has no knowledge that HSTS is enabled and a man-in-the-middle attack is still possible.

Browsers are trying to mitigate this issue by preloading a list of HSTS enabled hosts. However, this requires manual registration for each domain.

The registration is done here: https://hstspreload.org/

Note You need to log in before you can comment on or make changes to this bug.