I suggest you ...

Support for HTTP Strict Transport Security / HSTS

I'm wondering if Plesk also will implent HTTP Strict Transport (or HSTS) Security in the GUI. It's an extra layer of security for sites who need to be extra secure.

It's being done with a special header (mod_headers for Apache) and a TLS connection. The client (browser) can then verify if the server is the real server and not a man-in-the-middle server/attack.

It's as simple as adding the following code to the vhost config (HTTPS only!):

Apache:
Header always set Strict-Transport-Security "max-age=31536000; includeSubDomains"

Nginx:
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";

271 votes
Sign in
Check!
(thinking…)
Reset
or sign in with
  • facebook
  • google
    Password icon
    I agree to the terms of service
    Signed in as (Sign out)

    We’ll send you updates on this idea

    linqlol shared this idea  ·   ·  Flag idea as inappropriate…  ·  Admin →

    22 comments

    Sign in
    Check!
    (thinking…)
    Reset
    or sign in with
    • facebook
    • google
      Password icon
      I agree to the terms of service
      Signed in as (Sign out)
      Submitting...
      • mrwolf commented  ·   ·  Flag as inappropriate

        I was tempted to copy/paste the solutions given on the forum and here....
        Later I noticed I needed to change them as they were giving problems.

        One is minor and only involves the testing of the domain by SSLlabs.
        It turned out that SSLlabs chokes on websites that need credentials to test HSTS
        These sites need the "always" attribute.

        The other one is the flag "includeSubDomains".
        As most will use this nginx directive server wide and they don't really know for a 100% what their clients are up to, you shouldn't use that flag.
        I had a client that was running a plain http-only domain on a subdomain on some other server.
        That site stopped working for all clients that previously went to their main site.
        IMHO the flag includeSubDomains doesn't add anything extra for the site you're securing.
        It limits all the sites of that domain to https.
        This may be sensible for 1 specific domain, but most likely not a decision for you to make for ALL your clients.

        add_header Strict-Transport-Security 'max-age=15768000' always;

      • Nelsir Carlos Luterek commented  ·   ·  Flag as inappropriate

        good afternoon
        This feature will be very useful since many internet sites like google chrome browser already uses this technology, my vote is to be implemented in plesk.

      • Jordan Schelew commented  ·   ·  Flag as inappropriate

        I'm in favour of this as well. But a quick warning: make sure to remove the 'includeSubDomains' if the domain is being used for the Quick Preview URL.

      • Abdullah commented  ·   ·  Flag as inappropriate

        A very simple feature to implement, yet it's been 3+ years. Having to patch it through HTTP directives.

      • DerDanilo commented  ·   ·  Flag as inappropriate

        This could be added for each subdomain/domain config page, just add a tickbox like the one that allows recirect from http to https.

        Thanks!

      • Michael Lux commented  ·   ·  Flag as inappropriate

        I'm already using HSTS via custom headers and would greatly appreciate a standard, less error-prone way for always using HSTS headers and automatic redirect to HTTPS.

        @Marco Marsala: HSTS is a great technique and so far the only promising technique to stop SSL-Stripping attacks, for example in public WiFis.
        The reason for big sites not using this is that it can break backwards compatibility in some scenarios, which seem more important to them than the security of their customers.

      ← Previous 1

      Feedback and Knowledge Base