HTTP Strict Transport Security
HTTP Strict Transport Security https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Securityis a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking.
SUSE ManagerではHSTSを有効にできます。SUSE Managerサーバに対して有効にするには、次の手順に従います。
-
/etc/apache2/conf.d/<filename>.conf
に新しい設定ファイルを作成します(例:/etc/apache2/conf.d/zz-spacewalk-www-custom.conf
)。 -
Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains"
行を追加します。 -
systemctl restart apache2
を使用してApacheを再起動します。
SUSE Managerプロキシに対して有効にするには、次の手順に従います。
-
/etc/apache2/conf.d/<filename>.conf
に新しい設定ファイルを作成します(例:/etc/apache2/conf.dz/zz-spacewalk-proxy-custom.conf
)。 -
Header always set Strict-Transport-Security "max-age=63072000; includeSubDomains"
行を追加します。 -
systemctl restart apache2
を使用してApacheを再起動します。
When naming the new config file |
When HSTS is enabled while using the default SSL certificate generated by SUSE Manager or a self-signed certificate, browsers will refuse to connect with HTTPS unless the CA used to sign such certificates is trusted by the browser. If you are using the SSL certificate generated by SUSE Manager, you can trust it by importing the file located at http://<SERVER-HOSTNAME>/pub/RHN-ORG-TRUSTED-SSL-CERT to the browsers of all users. |