The cert is self signed. Whats is the conclusion, chrome is violating the RFC? It DOES let me proceed.
On 10/6/14 5:52 PM, Scott (firstclasswatches.co.uk) wrote:
> Hello,
>
> Not strictly a httpd specific issue but nevertheless, Chrome/Firefox
> should ignore the header because it is not delivered with a valid
> certificate and thus there is no way of knowing if it was actually
> issued by the website.
Spec says in this exact case, the TLS connection should be refused:
http://tools.ietf.org/html/rfc6797#section-11.3
> You should get the expected result if you first respond with an HSTS
> header in a valid TLS request and then /future/ requests should be
> prevented from proceeding if there is a certificate error.
>
> This is why HSTS are being preloaded for major websites as that would
> to cover the first request. For your average website there isn't
> currently a solution to this.
- -chris
---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx
---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx