Skip to content

Commit e478af1

Browse files
authored
Enable HSTS in vhost on PUBLIC_ALIAS_FQDN as well for increased security (#283)
Add missing HSTS header on the `PUBLIC_ALIAS_FQDN` vhost to avoid security degradation if in use with less security focused clients. Make sure plain HTTP requests for `BASE_FQDN` vhost stays on corresponding HTTPS vhost to assure HSTS there.
2 parents fa05006 + 8089acb commit e478af1

File tree

2 files changed

+18
-2
lines changed

2 files changed

+18
-2
lines changed

mig/install/apache-MiG-template.conf

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -480,7 +480,7 @@ __IS_VERIFYCERTS_COMMENTED__ <VirtualHost *:${PUBLIC_HTTP_PORT}>
480480
__PREFER_HTTPS_COMMENTED__<IfDefine PUBLIC_HTTPS_PORT>
481481
__PREFER_HTTPS_COMMENTED__ RewriteCond %{HTTPS} off
482482
__PREFER_HTTPS_COMMENTED__ RewriteCond %{HTTP_HOST} ^${BASE_FQDN}$
483-
__PREFER_HTTPS_COMMENTED__ RewriteRule ^/?(.*) https://${PUBLIC_FQDN}:${PUBLIC_HTTPS_PORT}/$1 [R,L]
483+
__PREFER_HTTPS_COMMENTED__ RewriteRule ^/?(.*) https://${BASE_FQDN}:${PUBLIC_HTTPS_PORT}/$1 [R,L]
484484
__PREFER_HTTPS_COMMENTED__
485485
__PREFER_HTTPS_COMMENTED__ RewriteCond %{HTTPS} off
486486
__PREFER_HTTPS_COMMENTED__ RewriteCond %{HTTP_HOST} ^${PUBLIC_FQDN}$
@@ -781,6 +781,14 @@ __IS_VERIFYCERTS_COMMENTED__ <VirtualHost *:${PUBLIC_HTTP_PORT}>
781781
SSLCertificateKeyFile __MIG_CERTS__/${PUBLIC_ALIAS_FQDN}/server.key
782782
SSLCertificateChainFile __MIG_CERTS__/${PUBLIC_ALIAS_FQDN}/server.ca.pem
783783

784+
<IfModule mod_headers.c>
785+
# Use HSTS if enabled
786+
__HSTS_COMMENTED__ Header always set Strict-Transport-Security "max-age=31536000"
787+
# As a precaution apply proxy limit in line with security advisory on:
788+
# http://www.apache.org/security/asf-httpoxy-response.txt
789+
RequestHeader unset Proxy early
790+
</IfModule>
791+
784792
# SSL Engine Switch:
785793
# Enable/Disable SSL for this virtual host.
786794
SSLEngine on

tests/fixture/confs-stdlocal/MiG.conf

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -480,7 +480,7 @@ Alias /status-events.json "/home/mig/state/wwwpublic/status-events.json"
480480
<IfDefine PUBLIC_HTTPS_PORT>
481481
RewriteCond %{HTTPS} off
482482
RewriteCond %{HTTP_HOST} ^${BASE_FQDN}$
483-
RewriteRule ^/?(.*) https://${PUBLIC_FQDN}:${PUBLIC_HTTPS_PORT}/$1 [R,L]
483+
RewriteRule ^/?(.*) https://${BASE_FQDN}:${PUBLIC_HTTPS_PORT}/$1 [R,L]
484484

485485
RewriteCond %{HTTPS} off
486486
RewriteCond %{HTTP_HOST} ^${PUBLIC_FQDN}$
@@ -781,6 +781,14 @@ Alias /status-events.json "/home/mig/state/wwwpublic/status-events.json"
781781
SSLCertificateKeyFile /home/mig/certs/${PUBLIC_ALIAS_FQDN}/server.key
782782
SSLCertificateChainFile /home/mig/certs/${PUBLIC_ALIAS_FQDN}/server.ca.pem
783783

784+
<IfModule mod_headers.c>
785+
# Use HSTS if enabled
786+
Header always set Strict-Transport-Security "max-age=31536000"
787+
# As a precaution apply proxy limit in line with security advisory on:
788+
# http://www.apache.org/security/asf-httpoxy-response.txt
789+
RequestHeader unset Proxy early
790+
</IfModule>
791+
784792
# SSL Engine Switch:
785793
# Enable/Disable SSL for this virtual host.
786794
SSLEngine on

0 commit comments

Comments
 (0)