Peter Law
2016-03-30 16:04:20 UTC
Hi,
HSTS is an HTTP header which tells visitors browsers to always only
connect over HTTPS. We currently have this enabled. At the moment we
also redirect everything (TLS or not, subdomain or not) to
https://www.studentrobots.org/.
Clean browser instances can't know about HSTS requests yet, so it
turns out that Google maintain a preload list at
https://hstspreload.appspot.com/. That list also ends up being used by
Firefox & IE/Edge as well.
There are some additional requirements for inclusion in the list:
- enable the includeSubDomains token in the header
- enable the (non-standard) preload token in the header
Making these changes is fairly simple, but we'd want to make sure that
we don't end up breaking things.
On the subdomains side, we previously didn't have a wildcard cert,
though we now do. I'm guessing this is why this wasn't included in the
headers originally.
The only other caveat for preload inclusion is that doing so is a
long-term thing -- while submission is semi-automated, removal is
highly manual. The list is also part of the browsers' source code, so
takes months to cycle into the current versions. I don't think this is
an issue as we're already planning to continue supporting HTTPS for a
long time.
Thoughts on whether we should enable the subdomain and/or preload
tokens would be welcome.
Thanks,
Peter
HSTS is an HTTP header which tells visitors browsers to always only
connect over HTTPS. We currently have this enabled. At the moment we
also redirect everything (TLS or not, subdomain or not) to
https://www.studentrobots.org/.
Clean browser instances can't know about HSTS requests yet, so it
turns out that Google maintain a preload list at
https://hstspreload.appspot.com/. That list also ends up being used by
Firefox & IE/Edge as well.
There are some additional requirements for inclusion in the list:
- enable the includeSubDomains token in the header
- enable the (non-standard) preload token in the header
Making these changes is fairly simple, but we'd want to make sure that
we don't end up breaking things.
On the subdomains side, we previously didn't have a wildcard cert,
though we now do. I'm guessing this is why this wasn't included in the
headers originally.
The only other caveat for preload inclusion is that doing so is a
long-term thing -- while submission is semi-automated, removal is
highly manual. The list is also part of the browsers' source code, so
takes months to cycle into the current versions. I don't think this is
an issue as we're already planning to continue supporting HTTPS for a
long time.
Thoughts on whether we should enable the subdomain and/or preload
tokens would be welcome.
Thanks,
Peter
--
You received this message because you are subscribed to the Google Groups "Student Robotics Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to srobo-devel+***@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
You received this message because you are subscribed to the Google Groups "Student Robotics Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to srobo-devel+***@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.