-
Notifications
You must be signed in to change notification settings - Fork 1.1k
Re-activate top-100 from #10538 #10545
Comments
|
|
Note: the relevant HSTS files to be checked for inclusion are those in the browsers we support: Firefox Stable: https://hg.mozilla.org/releases/mozilla-aurora/raw-file/tip/security/manager/ssl/nsSTSPreloadList.inc Chromium Stable: https://chromium.googlesource.com/chromium/src.git/+/59.0.3071.109/net/http/transport_security_state_static.json?format=TEXT |
@Hainish, but ultimately, those lists are pulled from hstspreload.org, right ? There is simply a delay before domains are included in the lists you mention.
That's how I understand this at least. Please tell me if I am mistaken. |
The browsers are based on the Chrome list, yes. But it may take a while before they are included in the browsers, so we don't want to remove the rules that are preloaded from the canonical source prematurely and leave them actually unprotected in the browsers. |
Also Mozilla has its own logic for removing preloaded domains, and it's often changing and not documented very well. So we can't count on the Mozilla implementation mirroring the Chrome list very closely. |
I've just found out that |
Agreed. This is why we should keep different domains in separate rulesets. Updating behemoths such as |
It seems like at the very least we should remove the problematic domains flagged by the fetch test, even if we don't have time to go through the entire rule and simplify it. |
Closing, since this seems to be done now. |
Thanks! |
#10536 #10538 I cannot do this all myself. Please mark this as a Good Volunteer Work. Thanks!
top-100
The text was updated successfully, but these errors were encountered: