Quantcast
Viewing all articles
Browse latest Browse all 17

Updated Wiki: Documentation

How to enable HSTS

Image may be NSFW.
Clik here to view.
Configure1.png

Image may be NSFW.
Clik here to view.
Configure2.png

As version 2.0.0.0 a configuration item has been added for redirecting insecure requests.

How to enable HSTS using the web.config

Once the module is installed, if you do not use the IIS Manager, HSTS can be enabled on a per-website basis by adding this to the web.config:
<configuration>
    <system.webServer>
        <hsts max-age="31536000" includeSubDomains="true" enabled="true" insecureRedirect="true" />
    </system.webServer>
</configuration>

What changes does the installer make? Or, how to manual install.

Module

  1. HstsIisModule.dll is copied to the inetsrv directory.
  2. In applicationHost.xml: configuration/system.webServer/globalModules: <add name="HstsIisModule" image"'%windir%\System32\inetsrv\HstsIisModule.dll" />
  3. (IIS7) In applicationHost.xml: configuration/location[path=""]/system.webServer/modules: <add name="HstsIisModule />
  4. (IIS8) In applicationHost.xml: configuration/system.webServer/modules: <add name="HstsIisModule />
  5. HSTS_Schema.xml is copied to inetsrv/config/schema directory.
  6. In applicationHost.xml: configuration/configSections/sectionGroup[name='system.webServer']: <section name="hsts" overrideModeDefault="Allow" />

Manager

  1. Register the HSTS-IIS-Module.manager.dll into the GAC. (To manually do this, use the gacutil.exe)
  2. In administration.config: /configuration/moduleProviders: <add name="hsts" type="HSTS_IIS_Module.Manager.ConfigModuleProvider, HSTS-IIS-Module.manager, Version=2.0.0.0, Culture=neutral, PublicKeyToken=26873d35e352ec07" />
  3. In administration.config: configuration/location[path='.']/modules: <add name="hsts" />

Frequently Asked Questions:

Why build this module?
Whilst it is simple to add a custom header to an IIS site, there is no simple way to add the HSTS header in a way that is compliant with the draft specification (RFC 6797). Specifically from section 7.2:

An HSTS Host MUST NOT include the STS header field in HTTP responses conveyed over non-secure transport.

An additional driver for such a module is the seriousness of attack vectors such as sslstrip. It is hoped that simplicity of installation and configuration will avoid any excuse for not implementing the most effective defence against such attacks.

Why not just use an IIS custom header?
Short answer, you pretty much can and, in fact, this is often the answer on forums and wikis all over the Internet.

However, strictly speaking, this solution does not follow the HSTS draft specification as the header will also be injected into non-secure responses. In reality, browsers ignore this header when sent over insecure channels, but this cannot be guaranteed. If a browser mistakenly accepts the header over an insecure channel, it's effectiveness is undermined. This is probably unlikely, but what is the point of a spec if it isn't followed.

Additionaly, as explained in "Why build this module?", I wanted to make configuring HSTS as simple as possible to encourage it's adoption.

I have a criticism, an idea, an issue, a request, want to say hello.
Please feel free to contact me:
*Email: hstsiis <a in a circle> shaneargo.net
*Twitter: @shane_argo

You should also be able to log issues in the tracker here on CodePlex.

I am running this module in production/test/x86/x64/Server 2K8/Server 2k12/giraffe/anything.
That's not a question. But please tell me. I'd love to hear about it, especially if you are running it on a giraffe.

General questions about HSTS

Couldn't a man in the middle (MITM) simply strip the Strict-Transport-Security header?
Yes, for the first request the browser makes. The purpose of HSTS is to greatly reduce the attack surface, but doesn't completely eliminate the risk. This is the reason that the max-age is recommended to be so long (a year or two).

When the browser first makes a request to a domain, which returns the Strict-Transport-Security header, the browser records the domain in the HSTS list and sets the expiry to the 'max-age' seconds from now. This means that for the next year or two, that domain is protected from MITM attacks as the browser will refuse to communicate without SSL/TLS.

An example of this would be accessing your internet banking from home on your laptop. Your browser records your banks domain as secure. Now when you are out and about, accessing your internet banking from a coffee shop, you can rest assured that you are protected from a MITM.

Clearing the browser cache, history etc. does not clear the HSTS list. The list can be managed manually using in-built tools in the browser.

What browsers support HSTS?
As this is an ever changing list, I will not provide a definitive list here. Generally speaking, most modern browsers support it, except Internet Explorer. For information check out the OWASP wiki page.

Here is a feature request to have HSTS support added to IE.

Viewing all articles
Browse latest Browse all 17

Trending Articles