Comments on: All HTTPS all the time, With HSTS to boot https://blog.plip.com/2015/01/27/all-https-all-the-time-with-hsts-to-boot/ Fri, 11 Dec 2015 06:53:39 +0000 hourly 1 https://wordpress.org/?v=6.7.2 By: Let’s Encrypt TLS & A+ on SSL Labs https://blog.plip.com/2015/01/27/all-https-all-the-time-with-hsts-to-boot/#comment-7638 Fri, 11 Dec 2015 06:53:39 +0000 http://blog.plip.com/?p=1240#comment-7638 […] you may recall, around here we like our TLS, and we like it rare!  I have no idea what “rare” means […]

]]>
By: James C https://blog.plip.com/2015/01/27/all-https-all-the-time-with-hsts-to-boot/#comment-157 Wed, 28 Jan 2015 01:02:27 +0000 http://blog.plip.com/?p=1240#comment-157 In reply to mrjones.

Yeah, you may not realize all the places you use the base domain plip.com (development, test, at home, Google Apps, other services) and the includeSubdomains option really breaks things across the board without any clear way to fix it except to touch every browser that has ever visited plip.com :)
For your personal stuff, or a new site, it’s not a problem, but could be a big one if you use it on a busy established domain.

]]>
By: mrjones https://blog.plip.com/2015/01/27/all-https-all-the-time-with-hsts-to-boot/#comment-155 Tue, 27 Jan 2015 19:09:04 +0000 http://blog.plip.com/?p=1240#comment-155 In reply to James C.

James – thanks for the tip about the wrong link – it’s fixed now. I’ll check out the ssllabs.com site as I definitely need to brush up on my ciphers!

I wasn’t sure about the subdomains for HSTS. The OWASP page says, “Before enabling includeSubDomains, also consider the impact of any existing DNS CNAME records for CDNs, email services, or other 3rd party services. Since includeSubDomains will force such CNAME subdomains to https:// it’s likely the browser will throw a domain-mismatch error, which is hard to reverse because of the browser caching nature of HSTS.” I take it you’ve had problems along these lines?

]]>
By: James C https://blog.plip.com/2015/01/27/all-https-all-the-time-with-hsts-to-boot/#comment-154 Tue, 27 Jan 2015 18:11:58 +0000 http://blog.plip.com/?p=1240#comment-154 Very nice, I’ve been using HSTS for some time, here’s a tip for the future, no matter how tempting, don’t use the “includeSubDomains” option :)

This is a great resource for evaluating your ciphers list to make sure you’re not using any old crypto options vulnerable to known attacks: https://www.ssllabs.com/ssltest/

And your first link to OWASP is actually linking to ithemes.com :)

]]>