Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • TPA team TPA team
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 177
    • Issues 177
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • The Tor Project
  • TPA
  • TPA teamTPA team
  • Issues
  • #40582
Closed
Open
Created Jan 16, 2022 by nusenu@nusenu

HSTS preloading for torproject.net

I hope this is the correct place to report this.

To protect users from sslstrip type of attacks HSTS preloading is the best way to go when aiming for a broad coverage.

Unlike torproject.org, torproject.net is currently not covered by HSTS preloading:

https://hstspreload.org/?domain=torproject.net vs https://hstspreload.org/?domain=torproject.org

If for some reason it is not possible to enable HSTS preloading on torproject.net, the next best thing is to submit all domains that support HTTPS to HTTPS-Everywhere https://github.com/EFForg/https-everywhere/blob/master/src/chrome/content/rules/Torproject.xml

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking