Ask Learn
Preview
Ask Learn is an AI assistant that can answer questions, clarify concepts, and define terms using trusted Microsoft documentation.
Please sign in to use Ask Learn.
Sign inThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
As part of our ongoing commitment to help build an interoperable, secure web that “just works,” we're excited to announce support for HTTP Strict Transport Security (HSTS) in Internet Explorer. This change can be previewed using Internet Explorer in the Windows 10 Technical Preview, and will come to Project Spartan in a later update.
The HSTS policy protects against variants of man-in-the-middle attacks that can strip TLS out of communications with a server, leaving the user vulnerable. For example, a user may initially connect to a non-encrypted version of a website before being redirected to a secure connection. An attacker exploiting the non-encrypted connection could redirect the user to a malicious site. HSTS mitigates this attack vector by allowing sites to specify that the browser should always use a secure connection to the server. HSTS provides two methods for sites to secure their connections:
There are two important changes that impact users on sites using HSTS. First, when there is a certification error with a HSTS server, the user will not be able to click through and ignore the certificate error; they must abort their connection. Second, mixed content is not supported on servers supporting HSTS; all the content must be secure.
These changes are available for preview in the January updates to the Windows 10 Technical Preview. Join the Windows Insider Program to see HSTS in action in IE and let us know if you have feedback @IEDevChat or on Connect.
— Mike Bell, Program Manager, Storage, Network, and Print
— David Walp, Program Manager, Internet Explorer
Anonymous
February 16, 2015
Very happy to see this feature added to IE.
And thank you for the comment about the preload list. I can't believe I never heard about that little bit. Just registered our site.
Anonymous
February 16, 2015
While this is a great security feature, it awkward to see the hard coded list as such.
How would this list scale beyond a hundred?
How the update will happen without the browser itself?
It will be stupid to just follow what chromium did.
Anonymous
February 16, 2015
IE team: This is fantastic to hear, thanks.
Santosh: Why is it stupid? The Chromium list has close to 2000 entries in a JSON file at the moment, and seems to be doing fine. And I can't think of any reason why this list needs to be updated than your browser should be getting updated anyway. Here's the current location of the list in Chromium's source tree:
chromium.googlesource.com/.../transport_security_state_static.json
It'd be good to hear engineering arguments for changing from this (proven) approach, more than just an assertion that it's awkward.
Anonymous
February 16, 2015
Super-exciting, thanks for the post!
A few questions:
Anonymous
February 16, 2015
The comment has been removed
Anonymous
February 16, 2015
The comment has been removed
Anonymous
February 16, 2015
What is wrong with requiring any redirect from http to https to be within the same domain? Or at least, warning the user if they are redirected off-site?
Anonymous
February 16, 2015
Best practice is to apply HSTS to the entire domain to prevent the possibility of credentials leaking anywhere. For instance if the cookies weren't secure then there is still the possibility of MITM on the http site in the domain. I'm sure there are other vectors of attack because there isn't the same level of protection within a domain. Since normally the entire domain would be covered by HSTS the browser wouldn't make an initial request to an http site on the domain.
Anonymous
February 17, 2015
Read the following: blog.nvisium.com/.../is-your-site-hsts-enabled.html
Anonymous
February 18, 2015
@EricLaw - Thanks for the great questions! Here are some thoughts from the team:
Our initial approach to supporting HSTS is to focus on scenarios where user are most commonly exposed to, which in this case is IE and Spartan clients. Adding HSTS support to WinHTTP and System.NET is something we’ll be evaluating in the future.
Mixed content – We do allow audio/video in the mixed mode scenario as it applies to HSTS.
DOM – The DOM reference should be changed. IE catches the mixed content issue before WinINet can upgrade the protocol to be secure.
HSTS in IE InPrivate mode – In the initial release, HSTS will be turned off when a user is in InPrivate mode. However, we have plans to address the scenario.
Client-server clock offset – We are aware of this issue and it is our roadmap to be addressed.
Public Key Pinning – This is currently not supported but is something we're looking at.
Anonymous
February 18, 2015
The comment has been removed
Anonymous
February 18, 2015
@EricLaw: Actually you can still detect whether users have visited the site by using www.ahstsdomain.com/.../img.jpg. If it succeeds then they have visited the site before.
Anonymous
February 23, 2015
@ EricLaw -
Anonymous
February 24, 2015
www.howtogeek.com/.../download.com-and-others-bundle-superfish-style-https-breaking-adware
Thanks for being so useless when it comes to HTTPS & Windows root store security, MS.
Anonymous
February 25, 2015
I've been looking for a way to enforce certificate pinning on an SSL VPN product (which uses windows APIs and the windows certificate store for connections).
Would this help?
Or, can EMET be configured to drop connection which fail certifcate pinning rules instead of popping up a useless warning that would be ignored by users?
Anonymous
February 26, 2015
Hello! Glad to see that IE is implementing HSTS. I'm a bit confused by this statement "mixed content is not supported on servers supporting HSTS". Does it mean that mixed active (blockable) content will be blocked on HSTS pages without a way for the user to override it? Or does it mean that all mixed content (active/blockable and passiveoptionally-blockable) will be blocked by default on HSTS pages with a user override option?
Mixed passive (optionally-blockable) content includes images, <video>, and <audio>.
Anonymous
March 04, 2015
@tanvi
Sorry for the confusion - it means that mixed active (blockable) content will be blocked on HSTS pages without a way for the user to override it.
Anonymous
March 04, 2015
Thanks Kyle for your response and for clearing this up!
Anonymous
March 30, 2015
Invoke Moving Services is a family-owned moving company operated in Texas. Our Fort Worth Movers do all types of local and long distance moving services. http://www.invokemoving.com
Anonymous
March 30, 2015
Invoke Moving Services is a family-owned moving company operated in Texas. Our Fort Worth Movers do all types of local and long distance moving services. invokemoving20@gmail.com
Anonymous
March 31, 2015
please lett me conecte
Ask Learn is an AI assistant that can answer questions, clarify concepts, and define terms using trusted Microsoft documentation.
Please sign in to use Ask Learn.
Sign in