There isn’t a commit yet, but https://issues.apache.org/jira/browse/SOLR-15578 
was raised about adding this support.   



> On Jun 6, 2022, at 7:25 AM, matthew sporleder <msporle...@gmail.com> wrote:
> 
> https://stackoverflow.com/questions/3009631/setting-http-headers-with-jetty
> 
> On Mon, Jun 6, 2022 at 7:03 AM Anchal Sharma2 <anchs...@in.ibm.com> wrote:
> 
>> Hi All,
>> 
>> After enabling SSL on apache solr using steps in solr guide(
>> https://solr.apache.org/guide/8_11/enabling-ssl.html) , we got below
>> vulnerability reported to us by our security team . Could someone please
>> help suggest how to resolve this for Solr v8.11.1?
>> 
>> VULNERABILITY -HSTS Missing From HTTPS Server (RFC 6797)
>> 
>> DESCRIPTION -The remote web server is not enforcing HSTS, as defined by
>> RFC 6797. HSTS is an optional response header that can be configured on the
>> server to instruct the browser to only communicate via HTTPS. The lack of
>> HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and
>> weakens cookie-hijacking protections.
>> 
>> SUGGESTED SOLUTION -Configure the remote web server to use HSTS.
>> 
>> Thank you
>> Anchal Sharma
>> 

_______________________
Eric Pugh | Founder & CEO | OpenSource Connections, LLC | 434.466.1467 | 
http://www.opensourceconnections.com <http://www.opensourceconnections.com/> | 
My Free/Busy <http://tinyurl.com/eric-cal>  
Co-Author: Apache Solr Enterprise Search Server, 3rd Ed 
<https://www.packtpub.com/big-data-and-business-intelligence/apache-solr-enterprise-search-server-third-edition-raw>
    
This e-mail and all contents, including attachments, is considered to be 
Company Confidential unless explicitly stated otherwise, regardless of whether 
attachments are marked as such.

Reply via email to