I am not sure whether I agree that that violates the RFC. The connection
does fail it just allows the user to override it.

In my opinion, I think that this is the only secure way to "fail" an
authenticated HSTS header otherwise anybody could in theory activate HSTS
on a host.

The same paragraph then goes to on to say that if you want to use a HSTS
policy with the host then distribute the CA certificate and then of course
it works as expected with No User Recourse.



Kind Regards,

Scott

First Class Watches
9 Warwick Road
Kenilworth
CV8 1HD
Warwickshire
United Kingdom

On 9 October 2014 22:27, Eddie B <ed...@mattermedia.com> wrote:

> The cert is self signed. Whats is the conclusion, chrome is violating the
> RFC? It DOES let me proceed.
>
> On 10/6/14 5:52 PM, Scott (firstclasswatches.co.uk) wrote:
> > Hello,
> >
> > Not strictly a httpd specific issue but nevertheless, Chrome/Firefox
> > should ignore the header because it is not delivered with a valid
> > certificate and thus there is no way of knowing if it was actually
> > issued by the website.
>
> Spec says in this exact case, the TLS connection should be refused:
> http://tools.ietf.org/html/rfc6797#section-11.3
>
> > You should get the expected result if you first respond with an HSTS
> > header in a valid TLS request and then /future/ requests should be
> > prevented from proceeding if there is a certificate error.
> >
> > This is why HSTS are being preloaded for major websites as that would
> > to cover the first request. For your average website there isn't
> > currently a solution to this.
>
> - -chris
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
>
>

Reply via email to