The HTTP page at http://domain.com sends an HSTS header. This has no effect over HTTP, and should be removed.
after setting up my web services via the nginx plugin as a reverse proxy, I examined them with various test tools.Hardenzie.com states:"Policy set on plaintext port: HSTS policies must not be transmitted over insecure channels."I am aware that this does not cause any harm.But restructuring nginx.conf could eliminate that:https://codefaq.org/server/how-to-fix-warning-unnecessary-hsts-header-over-http-in-htstpreload-org/
Securityheaders.com states:"server: This server header seems to advertise the software being run on the server but you can remove or change this value."This could be changed via the add-on module "nginx-headers-more".But this module would have to be compiled in:https://serverfault.com/questions/214242/can-i-hide-all-server-os-info
Would it also be possible to implement HTTP/3, QUIC and CORS header support?
I don't see that it is forbidden by the RFC: https://datatracker.ietf.org/doc/html/rfc6797
An HSTS Host MUST NOT include the STS header field in HTTP responses conveyed over non-secure transport.
First of all, the module is actually compiled in and usable.
restructuring nginx.conf could eliminate that
However, the feature still does not seem to be active.At least that's what SSLlabs.com and sslyze says.
add-on module "nginx-headers-more"
Might be worth checking other settings (TLS ver, ciphers list, ecdh curve)
Test Time: Tue, 15 Feb 2022 15:41:17 UTC
Only for one web service alone it did not work.Is this a bug?
remaining questions are if the nginx.conf could be restructured in a way that the HSTS policies are not transferred via http
hich parameters should be set so that the server name is not included in the header.