-
-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TODO: HSTS support #139
Comments
Looking into the security headers on Traefik documentation and examples (here), as well as this user suggestion, this could be one idea: [http.exampleContext]
[http.exampleContext.security.headers]
forceSTSHeader = true
stsIncludeSubdomains = true
stsPreload = true
stsSeconds=15552000 |
But I don't like the idea of |
Hi Paulo, thanks! I think it makes sense. |
Also IMHO, HSTS does not need to be controlled separately for each backend applications. I mean it should be a global option for Or should we need such a flexibility for the settings of backend applications? |
Except for legacy compatibility, I see no benefit in per upstream configuration. HSTS is on its way to be the standard and a global configuration ensures this uniform security policies across all backend applications. |
Probably as a first step this can be enabled whenever https redirection is configured. Not sure about |
RFC: https://datatracker.ietf.org/doc/html/rfc6797
Any idea of a configuration directive specifying HSTS for an app in TOML file?
The text was updated successfully, but these errors were encountered: