-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lacking HSTS is not really "Mediocre" #63
Comments
When HTTPS is on and a redirect forced, HSTS is so easy to add that I think the pressure to add it is a good thing. Not to mention that for major social media sites like Pinterest, people type in the URLs all the time, which opens up an attack window and leaks otherwise-secure cookies over the wire during the redirect. So the ROI seems pretty high. If it wasn't soooo easy to add, I'd agree. (HPKP, on the other hand, is valuable protection against active attacks, but is real work to pull off). |
While switching to HTTPS can break stuff, turning on HSTS can break more stuff. Right now, an improper HTTPS switch can cause issues for your users that you can't monitor without the CSP |
I agree that typing in the domain directly is a problem, but:
That said, I just typed If a site already does everything else right, HSTS mainly protects users with very hostile ISPs/governments. I hope it's clear I think every site should strive to deploy HSTS, but I think it's not fair to downgrade a site to an orange "Moderate" warning just because they don't use HSTS. I'd rather see something like a distinction between "good" and "excellent" (like SSL Labs offers an A+ for getting all the details right). |
That'd be just fine too. My main point is that HTTPSWatch picks its battles (UX-wise and engineering-wise) with what tech standards to track and factor in, and factoring in Strict Transport seems very wise. Whether that's a carrot or a stick is less important. I want to add that there is a non-technical but very important impact of Strict Transport, especially the effect of the preload list (which requires |
I mulled over changing the rating method for a few months while I worked on my forked version and finally decided to keep Mediocre for websites whose only failing was missing HSTS. I initially thought about changing Mediocre to something less judgmental, such as Needs Work, or implementing a tiered system as in #52. But then I decided that since HTTPS can be stripped by a MITM attack and if HSTS (plus preloading) is all that's keeping that from happening, then a website shouldn't be rated Good unless HSTS is present. To help visitors understand why HSTS is important I added a link to I also added this to my About page to explain my reasoning:
|
HSTS has gone more mainstream over the past year. I think this is now a reasonable policy. |
@SecureUtah, I like that explanation a lot, so I went ahead and copied it over to HTTPSWatch. Seems we can close this issue out. |
For example, Pinterest has a green checkmark for everything but HSTS. (Their SSL Labs grade is a B, but HTTPS Watch doesn't seem to care about SSL specifics).
But their search engine results (#62) results are HTTPS and they redirect to HTTPS – so it's likely that most (many?) users are following HTTPS URLs to pinterest.com now.
(That said, I happen to think HSTS is an excellent measure, and the most practical "final step" for sites to secure themselves until HPKP is ironed out. I help maintain the preload list. ;-)
The text was updated successfully, but these errors were encountered: