#HSTSpreloading
Explore tagged Tumblr posts
Text
HSTS Preload List For Secure And Encrypted Web Connections
HSTS Preload
The Department of Homeland Security and the National Cyber Security Alliance collaborate to increase public understanding of the value of cybersecurity during Cybersecurity understanding Month each year.
Today, anybody can easily start a blog, corporation, or portfolio website. Keeping it safe has also been more simpler and more crucial. To assist, Google is offering three actionable tips from professionals in internet security today that anyone may use to strengthen the protection of their websites. One website at a time, these suggestions will help safeguard world by protecting private and sensitive data.
TLS certificate installation
Sensitive data is protected during data transmission between your website and its visitors with Transport Layer Security certificate, often known as SSL. Although implementing SSL is essential if your website gathers sensitive data, such credit card numbers or password logins, experts advise doing it for all websites. SSL certificates are available from most registrars, and Let’s Encrypt allows you to install one on your own.
Select HSTS preloading
Websites that contemporary browsers are aware only load via a secure, encrypted connection are included in the HSTS-preload list. It is the simplest approach to guarantee that connections to websites cannot be reverted to an unencrypted connection, both on the first visit and on subsequent visits. HSTS-preloading may be obtained in two methods, which are discussed below.
Select a safe web hosting company
Look into and choose a hosting company that has a solid track record of implementing security features like intrusion detection systems, firewalls, and frequent backups.
Many website owners are unaware that malicious actors might attempt to change the content of their websites, implant malware or tracking, spoof across unsecured Wi-Fi networks, or reroute traffic. Even one unencrypted page may be used by them to access the rest of your website. There are two methods to use HSTS Preload to strengthen your website’s defense against HTTP downgrade attacks:
Put your domain on the HSTS-preload list and watch as the modification spreads across browsers.
Choose a top-level domain with HSTS Preload, like.app,.dev,.page,.rsvp, or.day, to start using the best degree of website encryption right now. Installing an SSL certificate is the only additional step, and browser updates are not required.
HSTS Preload List
Details
Domains may be added to Chrome’s HTTP Strict Transport Security (HSTS) preload list using this form. This is a list of websites that Chrome has hardcoded as only being accessible via HTTPS.
Based on the Chrome list, HSTS preload lists exist for most of the widely used browsers, including Chrome, Firefox, Opera, Safari, IE 11, and Edge. Refer to the compatibility matrix of HSTS.
Submission Conditions
A site may submit a request to be added to the preload list using this site’s form if it sends the preload directive in a HSTS header.
Your site has to meet the following criteria in order to be approved for the HSTS preload list using this form:
Present a legitimate certificate.
On the same host, if you are listening on port 80, redirect from HTTP to HTTPS.
Use HTTPS to serve all subdomains.
Specifically, if a DNS record exists for the www subdomain, you have to offer HTTPS for that subdomain.
It should be noted that all subdomains including internal, non-publicly accessible subdomains are subject to HSTS preloading.
For HTTPS queries, include a HSTS header on the base domain:
At least 31536000 seconds (1 year) must be the maximum age.
You need to provide the includeSubDomains directive.
It is necessary to provide the preload directive.
The HSTS header must still be included in any further redirects you serve from your HTTPS site.
In an effort to expand the availability of HSTS preload, Google Registry and registrars will be offering a 50% discount on Google HSTS-preloaded domains in October.
What is HSTS?
HSTS, or HTTP Strict Transport Security, secures website-user connections. HSTS tells browsers to always utilize HTTPS to access a website. HSTS aims to avoid downgrade attacks, which compel websites to use insecure HTTP connections. With out HSTS, such attacks might expose sensitive user data on a website.
In summary
Three crucial steps are advised by internet security experts to improve website security. Installing a Transport Layer Security (TLS) certificate is the first step towards encrypting data transit between users and your website. To guarantee secure connections and avoid downgrading to unencrypted connections, use HSTS-preloading as your second option. Finally, choose a reputable hosting company with strong security protocols. You may prevent possible dangers to your website and secure personal information by putting these precautions in place.
Read more on govindhtech.com
#HSTSPreloadList#EncryptedWebConnection#CyberSecurity#Google#summary#SubmissionConditions#HSTSpreloading#safewebhostingcompany#TLScertificate#technology#technews#news#govindhtech
0 notes
Note
hstspreload(.)org Can you activate HSTS on your services? It helps to pre-load your sites using HTTPS.
No. It is not a HTTPS-only website.
0 notes
Quote
Figura 1: Bootstrap MITM en HTTPs y la directiva preload en HSTS El truco se basa en que es la primera petición que se captura desde ese navegador al sitio. Es decir, alguien solicita http://www.facebook.com y el atacante captura esa petición la primera vez. Para ello el truco era utilizar la Evil FOCA para quitar del medio toda cabecera HSTS y cualquier petición HTTPS desde el cliente. Ese tipo de ataque que yo contaba y que implementamos en Evil FOCA se recoge en el estándar del HSTS (HTTP Strict Transport Security) en la sección 14.6 como BootStrap MITM vulnerabiliy, ya que si alguien es capaz de cazar la primera petición de un dominio bajo HSTS por un redirect, entonces el atacante podría hacer justo, justo, justo lo que hacía nuestra querida Evil FOCA en las demos que hice yo.Para resolver esto solo hay una solución, y es que todos los sitios que quieren ser HTTPS sí o sí, y que no quieren sufrir suplantaciones de certificados digitales, estén cargados previamente en una lista en el navegador. Es decir, que Google Chrome, Mozilla Firefox, Microsoft Edge o Apple Safari - por citar algunos - tengan una lista de fabrica con todos los dominios que sí o sí tienen que ser HTTPS. Así, cualquier dominio de esa lista pre-cargada en los navegadores que intentara ser accedido vía HTTP porque un atacante hiciera un ataque MITM como el que hacía yo con mi querida Evil FOCA, fallaría tanto si captura la primera petición como si es otra petición. VIDEOFigura 6: DefCON 21 Ataques IPv6 con Evil FOCA Para comprobar si un dominio está en la lista de pre-carga de HSTS, se puede hacer uso de esta web llamada HSTSPreload, y donde puedes poner cualquier dominio para validarlo. En este caso voy a probar el dominio de elladodelmal.com, y como veis me dice que es inseguro. Y lleva toda la razón. Este blog está hospedado en Blogger de Google, y viene del servicio Blogspot original. Este blog tiene una URL inicial que sigue funcionando que es elladodelmal.blogspot.com que hace la redirección a elladodelmal.com Figura 8: Dominios redirigidos a www.elladodelmal.com Pero también elladodelmal.com hace la redirección a www.elladodelmal.com y si hay peticiones HTTP se redirigen a HTTPs. Pero el servicio de Blogger no deja configurar las cabeceras HTTP para los dominios personalizados, así que no se puede solicitar estar en la lista de precarga.Figura 9: Configuración HTTPS en Blogger No obstante, si tu eres el dueño de tu servidor web y quieres evitar un ataque de Bootstrap Man in the Middle, y haces uso de HTTPS y HSTS previamente, puedes solicitar incluir tu dominio en la lista de precarga de dominios para que no haya ninguna primera petición sin HTTP jamás a tu dominio. Para ello, en la cabecera de HSTS debes añadir la directiva preload.Strict-Transport-Security: max-age=63072000; includeSubDomains; preload A partir de aquí, se producirá una validación de que tu servidor contra esa lista si previamente cumples los requisitos para entrar en ella, y se cerrará un ataque más de tu lista de posibles vectores de riesgo. Esto es algo que desde ElevenPaths, en nuestro servicio de pentesting persistente Faast hemos añadido en la última revisión de las directivas de seguridad HTTP para avisar a todos los administradores de dominios auditados. Este ejemplo es uno más de los muchos rinconcitos que debes tener protegido cuando pones un servicio en la web, ya que el número de vectores de ataques que existen cuando la superficie de exposición de tu servicio es "todo Internet" es muy alto. Y os dejo dos cosas que me han venido a la mente. La primera recomendaros el libro de Hacking Web Technologies 2ª Edición para los que os guste el hacking web, y la segunda la charla con el Decálogo de Seguridad Maligno, donde creo recordar que decía eso de "Si tu no auditas tu web otro lo hará por ti... y gratis". VIDEO Figura 12: Decálogo de seguridad Maligno por Chema AlonsoAutor: Chema Alonso (Contactar con Chema Alonso)
https://www.elladodelmal.com/2020/07/bootstrap-mitm-en-https-y-la-directiva.html
0 notes