Generated by GPT-5-mini| HTTP Strict Transport Security | |
|---|---|
| Name | HTTP Strict Transport Security |
| Abbreviation | HSTS |
| Introduced | 2010 |
| Standard | RFC 6797 |
| Domain | Transport Layer Security |
| Related | Transport Layer Security, HTTPS, Public Key Infrastructure |
HTTP Strict Transport Security HTTP Strict Transport Security is a web security policy mechanism designed to enforce secure connections between web browsers and servers. It instructs compatible user agents to interact with specified hosts using only secure Transport Layer Security channels, reducing the risk of passive and active network interception. Major web platforms and standards bodies adopt and reference the policy to improve end-to-end confidentiality and integrity for web traffic.
HSTS declares a host-level policy that tells compatible clients like Google Chrome, Mozilla Firefox, Microsoft Edge, Apple Safari, and Opera to convert all future Hypertext Transfer Protocol requests to HTTPS and to refuse communication with a host over insecure Transport Layer Security alternatives. The mechanism is typically delivered via an HTTP response header and is closely related to specifications from the Internet Engineering Task Force and implementations in Apache HTTP Server, NGINX, Internet Information Services, and cloud platforms such as Amazon Web Services, Google Cloud Platform, Microsoft Azure.
HSTS emerged from discussions among engineers at organizations including Google, Mozilla Foundation, Microsoft Corporation, and researchers at University of California, Berkeley and Stanford University. Early deployment activity involved projects like OWASP and presentations at conferences including Black Hat USA and DEF CON. The mechanism was formalized by the Internet Engineering Task Force as RFC 6797, which references cryptographic primitives defined by the IETF TLS Working Group and coordination with W3C and ICANN stakeholders. Subsequent updates and guidance have been influenced by reports from ENISA, advisories from CERT Coordination Center, and best-practice documents from organizations like NIST.
HSTS is conveyed via the Strict-Transport-Security header field in an HTTPS response served by a host such as example.com or sites hosted on platforms like GitHub Pages and WordPress.com. The header comprises directives such as max-age, includeSubDomains, and preload. For example, the max-age directive expresses a time interval in seconds, while includeSubDomains extends the policy to subhosts under domains administered from providers like Cloudflare or Akamai Technologies. The preload concept led to the creation of the HSTS preload list, populated via coordination with browser vendors including Google, Mozilla Foundation, and Apple Inc., and operated through registries maintained by services like Chromium and Mozilla Add-ons.
HSTS mitigates attack vectors such as man-in-the-middle attack and downgrade attacks exemplified in past incidents affecting organizations like Sony Pictures Entertainment and Target Corporation. By preventing silent HTTP downgrades, HSTS complements mechanisms such as Public Key Pinning and Certificate Transparency while relying on trust anchors in Web PKI ecosystems managed by Let's Encrypt, DigiCert, GlobalSign, and Entrust. Limitations include bootstrapping problems for first-time visitors, interactions with captive portals in networks operated by venues like Starbucks or Airports Council International, and the risk of misconfiguration affecting services such as GitHub, Dropbox, or Salesforce. Regulatory and legal contexts involving entities like European Commission guidance or Federal Communications Commission rules can impact deployment in specific jurisdictions such as United States and European Union member states.
Major browser projects implemented HSTS support after contributions from vendors like Google, Mozilla Foundation, Microsoft Corporation, and Apple Inc.. Support matrices and test suites have been published by organizations such as W3C, IETF, and OWASP. Server implementations exist for Apache HTTP Server, NGINX, Lighttpd, Caddy, and reverse proxies like HAProxy and Envoy (software). Cloud and hosting providers including Amazon Web Services, Google Cloud Platform, Microsoft Azure, Cloudflare, and Fastly offer guidance and managed settings for HSTS headers. Tools for verification and analysis include SSL Labs, Mozilla Observatory, and security scanners from Rapid7 and Qualys.
Administrators should plan HSTS adoption through stages: enable HTTPS via certificates from providers like Let's Encrypt or DigiCert, configure server headers in NGINX or Apache HTTP Server, test with temporary max-age values, and then consider includeSubDomains and preload registration with the Chromium project and Mozilla submission processes. Best practices recommend HTTP to HTTPS redirects, HSTS header set on the base domain, use of long max-age intervals for stability, and coordination with CDNs like Akamai Technologies and Cloudflare. Operational concerns include certificate lifecycle management with tools from Certbot or acme.sh, DNS configuration with registrars like GoDaddy and Namecheap, and incident response alignment with teams such as SANS Institute and FIRST.
Attackers have attempted HSTS bypasses using techniques like SSL stripping against non-HSTS hosts, captive portal interference by ISPs or venues such as McDonald's Wi-Fi, and exploiting misissued certificates from compromised CAs impacting services provided by Comodo and Symantec. Mitigations involve ensuring inclusion in browser preload lists maintained by Chromium and Mozilla Foundation, deployment of Certificate Transparency logs monitored by entities like Google Transparency Report, revocation and incident handling coordinated with CA/Browser Forum, and use of multi-factor defenses including DNS-based Authentication of Named Entities where relevant. Security posture is further improved by comprehensive monitoring using platforms like Splunk, Elastic Stack, and coordinating disclosures through CERT Coordination Center.
Category:Computer security