Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable HSTS policy on taproot.watch #59

Closed
hsjoberg opened this issue May 14, 2021 · 2 comments
Closed

Enable HSTS policy on taproot.watch #59

hsjoberg opened this issue May 14, 2021 · 2 comments

Comments

@hsjoberg
Copy link
Owner

We will never serve content on HTTP, so to improve security it makes sense to enable HSTS.

Serving via HTTPS is currently out of scope of fork-explorer, so this has to be done on a reverse proxy (Nginx, Apache, Caddy, etc). taproot.watch uses Caddy, so I'll take a look there.

@stp-ip
Copy link

stp-ip commented May 18, 2021

This added to the site block for Caddy should do:

header {
	 Strict-Transport-Security "max-age=63072000; includeSubDomains; preload"
}

This sets the HSTS policy and also enables the site to be preloaded within browsers.
Preloading form, after the header is set: https://hstspreload.org/

@hsjoberg
Copy link
Owner Author

@stp-ip Thank you! This has now been enabled on taproot.watch and txt.taproot.watch. 💯

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants