Open cosmicgumbo opened 1 year ago
I agree with that and will open a pull request.
The commit is not merged yet. Missing HSTS is a pain...
I agree that this would be useful.
For when the NCPA devs are able to get around to this: the @ccztux's PR for this is #961.
The NCPA agent web page on the client (default port 5693) does not enforce HSTS. Per vulnerability scan from Tenable: The remote HTTPS server does not send the HTTP "Strict-Transport-Security" header. Synopsis: The remote web server is not enforcing HSTS, as defined by RFC 6797. Description: The remote web server is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. Solution: Configure the remote web server to use HSTS. See Also: https://tools.ietf.org/html/rfc6797