FutureQuest, Inc. FutureQuest, Inc. FutureQuest, Inc.

FutureQuest, Inc.
Go Back   FutureQuest Community > FutureQuest Site Owners (All may read - Only Site Owners May Respond) > Questions & Suggestions
User Name
Password  Lost PW

Reply
 
Thread Tools Search this Thread Display Modes
Old 12-16-2020, 08:30 AM   Postid: 188294
mromero
 
Posts: n/a
HTTP Strict Transport Security (HSTS)

All my sites on Futurequest Fail for the HTTP Strict Transport Security (HSTS) test at https://hstspreload.org/

When I try adding this to my .htaccess file:

<IfModule mod_headers.c>
Header set Strict-Transport-Security “max-age=10886400; includeSubDomains; preload”
</IfModule>

The site crashes with a 500 Internal Server Error

What is the solution?
  Reply With Quote
Old 12-18-2020, 05:36 PM   Postid: 188307
 Kevin
Systems Administrator
 
Kevin's Avatar
 
Join Date: Aug 2001
Location: Orlando, FL
Posts: 2,986
Re: HTTP Strict Transport Security (HSTS)

Your quotes are not quotes. You probably copy pasted that code from somewhere that used UTF8 special characters to make them look fancy but they aren't quotes.
__________________
Kevin
Kevin is offline   Reply With Quote
Old 12-20-2020, 07:55 AM   Postid: 188310
mromero
 
Posts: n/a
Re: HTTP Strict Transport Security (HSTS)

I tried again by loading the code at the top of the .htaccess file. The site does not crash anymore.

But it still fails the HTTP Strict Transport Security (HSTS) test.

In addition it says: Warning: Obsolete Cipher Suite The site is using obsolete TLS settings. Check out the site at https://www.ssllabs.com/ssltest/

Doing this second test, it gives me a grade B.

This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B. MORE INFO »
This server does not support Forward Secrecy with the reference browsers. Grade capped to B. MORE INFO »
This server supports TLS 1.0 and TLS 1.1. Grade capped to B. MORE INFO »

I tested Futurequest.net, and it too fails the HTTP Strict Transport Security (HSTS) test at https://hstspreload.org/

Check it out here https://hstspreload.org/?domain=futurequest.net

Quote:
Originally Posted by Kevin View Post
Your quotes are not quotes. You probably copy pasted that code from somewhere that used UTF8 special characters to make them look fancy but they aren't quotes.

Last edited by mromero : 12-20-2020 at 08:24 AM.
  Reply With Quote
Old 02-12-2021, 06:01 PM   Postid: 188361
Grant
Site Owner

Forum Notability:
10 pts: User-friendly
[Post Feedback]
 
Join Date: Nov 2003
Location: Canada
Posts: 61
Re: HTTP Strict Transport Security (HSTS)

I had the same basic question, HSTS looks like a good way to go.
Grant is offline   Reply With Quote
Old 10-18-2022, 10:13 AM   Postid: 188861
MarkW
Site Owner

Forum Notability:
10 pts: User-friendly
[Post Feedback]
 
Join Date: Apr 2001
Location: UK
Posts: 164
Re: HTTP Strict Transport Security (HSTS)

I'm also having issues related to security risks associated with obsolete/deprecated/weak TLS 1.0/1.1 and ciphers.

My client's IT security department is asking them to stop using the web application hosted here at FQ because of the potential risks/vulnerabilities - they also use ssllabs as one of their pentest tools.

With regard to the TLS 1.0 and 1.1, FQ says "This is something we could actually fix with a settings change. However, doing so would lock out user of older versions of Windows and iPhones. We have chosen to not make that change yet (it would apply to all sites so we can't make it an option in the CNC)."
I don't know which particular versions of Windows or iPhones (assume IOS versions) would be affected.

And with regard to Diffie-Hellman and Forward Secrecy, FQ says it intends to upgrade these but there is no target date.

I've relayed the above to my client and their IT security people. I'm not anticipating a positive (or even neutral) response.

Is anyone else in the same position with their clients and have some mitigation action/plan in place?

Mark
MarkW is offline   Reply With Quote
Old 10-24-2022, 11:15 AM   Postid: 188864
KKC1
Site Owner

Forum Notability:
0 pts: Even-handed
[Post Feedback]
 
Join Date: Mar 2006
Posts: 13
Re: HTTP Strict Transport Security (HSTS)

We had to change the PCI Compliance settings to Secure the last time we renewed our software liability insurance and they weren't happy about that and warned next time they probably wouldn't renew the insurance unless FQ implements some changes.
__________________
www.cmhsoftware.com
KKC1 is offline   Reply With Quote
Old 10-26-2022, 12:31 PM   Postid: 188865
MarkW
Site Owner

Forum Notability:
10 pts: User-friendly
[Post Feedback]
 
Join Date: Apr 2001
Location: UK
Posts: 164
Re: HTTP Strict Transport Security (HSTS)

@KKC1 - Wow, that must have been an unwelcome headache and a future worry.

My client's security peeps have responded saying (politely, but firmly) that the web-app server is vulnerable to BEAST, POODLE, etc. and pointing me to their 'recommended' standards.

I have had to remove all my client's branding from their web-app!

As far as I can tell from my Google searches, TLS 1.2 seems to have been supported by browsers for at least 7 years - TLS Protocol Compatibility - so I don't know which browsers (of any consequence) would be locked out.

I feel the writing is already on the wall for keeping the web-app here. And I don't want to expose either my client or myself to the consequences of a successful attack.
MarkW is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 visitors)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -4. The time now is 12:23 AM.


Running on vBulletin®
Copyright © 2000 - 2019, Jelsoft Enterprises Ltd.
Hosted & Administrated by FutureQuest, Inc.
Images & content copyright © 1998-2019 FutureQuest, Inc.
FutureQuest, Inc.