mirror of
https://github.com/laurivosandi/certidude.git
synced 2026-04-25 16:45:51 +03:00
[GH-ISSUE #17] Support HTTP Strict Transport Security #12
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/certidude-laurivosandi#12
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @laurivosandi on GitHub (Jan 20, 2017).
Original GitHub issue: https://github.com/laurivosandi/certidude/issues/17
Currently
insecureflag in/etc/certidude/client.confspecifies whether CA should be contacted over HTTP or HTTPS. Instead of such static configuration we should support HSTS.Possible implementation on the client side would perform first request over HTTP and if server redirects to HTTPS and returns with HSTS headers create a file eg /var/lib/certidude/ca.example.com/secure. If such file exists further requests would be performed over HTTPS by default.
@laurivosandi commented on GitHub (Apr 29, 2018):
Fixed with
github.com/laurivosandi/certidude@b9aaec7fa6, once CA cert is fetched the client always approaches CA over HTTPS