It seems like the handling of HSTS is incorrect in Firefox on Linux Mint per RFC6797 11.4.1, https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security and when compared to Google Chrome. I don't have the includeSubDomains flag set in the Strict-Transport-Security HTTP header, but Firefox upgrades the connection when I connect to the server on TCP 443 (Nginx) or TCP 8080 (Jenkins). The header is only set when connecting on TCP 443, so it should only be upgraded on TCP 443 unless I have the includeSubDomains flag set in the Strict-Transport-Security HTTP header and I don't.

I tested the behavior on Firefox 40.0.3 and Firefox 41.0 for Linux Mint and it incorrect, but the same versions for Windows 7 x64 work correctly.

I reported <https://bugs.launchpad.net/linuxmint/+bug/1494781> it to Linux Mint. It doesn't appear to happen in the upstream Ubuntu.

I'm injecting the header via Nginx with the following configuration.

add_header Strict-Transport-Security "max-age=63072000; preload";
add_header Public-Key-Pins "pin-sha256=\"[% ca_sha256_base64 %]\"; max-age=2592000\"";

Can someone help me verify the issue?

Thanks,
Arthur


This e-mail and any attachments may contain CONFIDENTIAL information, including 
PROTECTED HEALTH INFORMATION. If you are not the intended recipient, any use or 
disclosure of this information is STRICTLY PROHIBITED; you are requested to 
delete this e-mail and any attachments, notify the sender immediately, and 
notify the Mediture Privacy Officer at privacyoffi...@mediture.com.
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to