Windows News and info 15th Anniversary 2009-2024

Social Media - Search Engines - Browsers => Windows 10 IE11 => Topic started by: javajolt on February 17, 2015, 12:38:06 AM

Title: Microsoft to Support HTTP Strict Transport Security In Internet Exploer
Post by: javajolt on February 17, 2015, 12:38:06 AM
(http://i60.tinypic.com/2zjalar.jpg)
Microsoft today announced the support for HTTP Strict Transport Security (HSTS) (http://tools.ietf.org/html/rfc6797) in Internet Explorer. This is already part of Internet Explorer in the Windows 10 Technical Preview, and it will also come to Project Spartan in a later update.

Quote
HSTS specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections. This overall policy is referred to as HTTP Strict Transport Security (HSTS). The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example.
This feature protects against variants of man-in-the-middle attacks that can strip TLS out of communications with a server, leaving the user vulnerable.

HSTS provides two methods for sites to secure their connections:

■ Registering for a preload list: websites can register to be hardcoded by IE and other browsers to redirect HTTP traffic to http. Communications with these websites from the initial connection are automatically upgraded to be secure. Like other browsers which have implemented this feature, Internet Explorer’s preload list is based on the Chromium HSTS preload list (http://hstspreload.appspot.com/).

■ Serving a HSTS header: Sites not on the preload list can enable HSTS via the Strict-Transport-Security (http://developer.mozilla.org/en-US/docs/web/Security/HTTP_strict_transport_security) HTTP header. After an initial http connection from the client containing the HSTS header, any subsequent HTTP connections are redirected by the browser to be secured via http.

Read more about it here (http://blogs.msdn.com/b/ie/archive/2015/02/16/http-strict-transport-security-comes-to-internet-explorer.aspx).

via:microsoft-news