question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

HSTS enabled by default

See original GitHub issue

Description:

The NGINX page config states that an HSTS header should be sent even when a self-signed certificate is present. This blocks the usage of the newly installed Jitsi instance until a Let’s Encrypt certificate (or any other valid certificate) is deployed.

Steps to reproduce:

  1. Install Jitsi as described in the official quick start documentation (https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-quickstart)
  2. Try opening your servers Jitsi URL without installing a Let’s Encrypt certificate prior to accessing the URL.

Expected behavior:

If a self-signed certificate is present on the host the HSTS header should not be sent since it will prevent access to the page with most browsers otherwise. Jitsi should be able to run with a self-signed certificate by default.

Actual behavior:

The HSTS header is set no matter what type of certificate is used. This is due to the line add_header Strict-Transport-Security "max-age=63072000" always; within the file /etc/nginx/sites-available/<domain>.conf

Server information:

  • Jitsi Meet version: jitsi-meet:all/stable 2.0.5142-1
  • Operating System: Distributor ID: Debian Description: Debian GNU/Linux 10 (buster) Release: 10 Codename: buster

Client information:

  • Browser / app version: Google Chrome Version 87.0.4280.141 (Offizieller Build) (64-Bit)
  • Operating System: Microsoft Windows Version 1909 (OS Build 18363.1256)

Additional information:

FYI: I seared the template file within all repos this organization has but couldn’t find one. I’ll leave that up to you.

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Comments:9 (5 by maintainers)

github_iconTop GitHub Comments

1reaction
damenchocommented, Jan 11, 2021

There should at least be an option to disable this during the installation routine (as with docker) so users can willingly choose to not take advantage of HSTS.

So docker uses a separate set of configuration files so this can be added there.

0reactions
damenchocommented, Jan 11, 2021

The issue opened is that HSTS is enabled by default, and it should be that way. Any PRs are welcome that you can select to not enable it, but that is a huge task and may break many things around the packaging and needs a lot of testing.

Read more comments on GitHub >

github_iconTop Results From Across the Web

Default HSTS settings for a Web Site <hsts> - Microsoft Learn
Optional Boolean attribute. Specifies whether HSTS is enabled (true) or disabled (false) for a site. If HSTS is enabled, the Strict-Transport- ...
Read more >
HTTP Strict Transport Security - The HTTPS-Only Standard
A domain instructs browsers that it has enabled HSTS by returning an HTTP header over an HTTPS connection. In its simplest form, the...
Read more >
Strict-Transport-Security - HTTP - MDN Web Docs
The HTTP Strict-Transport-Security response header (often abbreviated as HSTS) informs browsers that the site should only be accessed using ...
Read more >
How to Enable HTTP Strict Transport Security (HSTS) Policy
This article will demonstrate the steps of enabling the HTTP Strict Transport Security (HSTS) policy for your website. You will also learn what...
Read more >
Enabling and disabling SSL HSTS
Enabling HSTS (RFC 6797) enforces secure HTTPS connection between a web browser and Standalone Sentry. By default, HSTS is disabled. Before enabling HSTS ......
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found