Skip to content

Commit

Permalink
Fixed typo
Browse files Browse the repository at this point in the history
  • Loading branch information
NetBender committed May 14, 2019
1 parent 9953de4 commit d56fc82
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion Evaluator/Mitigations/HSTS_not_set.xml
Expand Up @@ -3,7 +3,7 @@
<ExtendedName>HSTS not set</ExtendedName>
<Description>Without the HSTS header, an attacker can use the SSL stripping attack to redirect all the HTTPS connection to their unsecure counterparts. By doing this, all the messages are sent in plaintext and can thus be manipulated.</Description>
<Mitigation>
<Textual>Enable the HSTS header transmission within the webservers' settings</Textual>
<Textual>Enable the HSTS header transmission within the webserver's settings</Textual>
<Snippet>
<Apache>1. open your Apache configuration file (default: */etc/apache2/sites-available/default-ssl.conf*);
2. add the line `Header always set Strict-Transport-Security "max-age=31536000"`.
Expand Down

0 comments on commit d56fc82

Please sign in to comment.