[Webkit-unassigned] [Bug 282054] New: HSTS should ignore strict-transport-security response headers

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Thu Oct 24 11:37:38 PDT 2024


https://bugs.webkit.org/show_bug.cgi?id=282054

            Bug ID: 282054
           Summary: HSTS should ignore strict-transport-security response
                    headers
           Product: WebKit
           Version: Safari 18
          Hardware: Unspecified
                OS: Unspecified
            Status: NEW
          Severity: Normal
          Priority: P2
         Component: New Bugs
          Assignee: webkit-unassigned at lists.webkit.org
          Reporter: ericlaw at microsoft.com

https://issues.chromium.org/issues/41251622

Strict-Transport-Security response headers can cause problems for localhost web servers because STS applies host-wide, across all ports. This causes compatibility problems for web developers testing locally as well as end-users who use software packages that commonly spin up localhost webservers for ephemeral reasons (e.g. communication of an auth token from a web login to a local software package). If one local listener sets Strict-Transport-Security on a localhost response, it will be applied to all subsequent localhost requests regardless of port. We resolve this problem by ignoring Strict-Transport-Security headers on responses from localhost URLs.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20241024/13c6fd75/attachment.htm>


More information about the webkit-unassigned mailing list