diff --git a/src/Umbraco.Web.UI/Umbraco/config/lang/en.xml b/src/Umbraco.Web.UI/Umbraco/config/lang/en.xml
index 804a74e0c7..cf733abbf2 100644
--- a/src/Umbraco.Web.UI/Umbraco/config/lang/en.xml
+++ b/src/Umbraco.Web.UI/Umbraco/config/lang/en.xml
@@ -2038,7 +2038,7 @@ To manage your website, simply open the Umbraco back office and start adding con
A setting to create a header protecting against MIME sniffing vulnerabilities has been added to your web.config file.
Strict-Transport-Security, also known as the HSTS-header, was found.]]>
Strict-Transport-Security was not found.]]>
- Adds the header 'Strict-Transport-Security' with the value 'max-age=10886400; preload' to the httpProtocol/customHeaders section of web.config. Use this fix only if you will have your domains running with https for the next 18 weeks (minimum).
+ Adds the header 'Strict-Transport-Security' with the value 'max-age=10886400' to the httpProtocol/customHeaders section of web.config. Use this fix only if you will have your domains running with https for the next 18 weeks (minimum).
The HSTS header has been added to your web.config file.
X-XSS-Protection was found.]]>
X-XSS-Protection was not found.]]>
diff --git a/src/Umbraco.Web.UI/Umbraco/config/lang/en_us.xml b/src/Umbraco.Web.UI/Umbraco/config/lang/en_us.xml
index 500be9c2af..40699fa3ec 100644
--- a/src/Umbraco.Web.UI/Umbraco/config/lang/en_us.xml
+++ b/src/Umbraco.Web.UI/Umbraco/config/lang/en_us.xml
@@ -2052,7 +2052,7 @@ To manage your website, simply open the Umbraco back office and start adding con
A setting to create a header protecting against MIME sniffing vulnerabilities has been added to your web.config file.
Strict-Transport-Security, also known as the HSTS-header, was found.]]>
Strict-Transport-Security was not found.]]>
- Adds the header 'Strict-Transport-Security' with the value 'max-age=10886400; preload' to the httpProtocol/customHeaders section of web.config. Use this fix only if you will have your domains running with https for the next 18 weeks (minimum).
+ Adds the header 'Strict-Transport-Security' with the value 'max-age=10886400' to the httpProtocol/customHeaders section of web.config. Use this fix only if you will have your domains running with https for the next 18 weeks (minimum).
The HSTS header has been added to your web.config file.
X-XSS-Protection was found.]]>
X-XSS-Protection was not found.]]>
diff --git a/src/Umbraco.Web.UI/Umbraco/config/lang/fr.xml b/src/Umbraco.Web.UI/Umbraco/config/lang/fr.xml
index fb9e3ea1e6..83eb8ecc57 100644
--- a/src/Umbraco.Web.UI/Umbraco/config/lang/fr.xml
+++ b/src/Umbraco.Web.UI/Umbraco/config/lang/fr.xml
@@ -1813,7 +1813,7 @@ Pour gérer votre site, ouvrez simplement le backoffice Umbraco et commencez à
Une configuration a été ajoutée dans votre fichier web.config pour créer un header protégeant contre les vulnérabilités de MIME sniffing.
Strict-Transport-Security, aussi connu sous le nom de HSTS-header, a été trouvé.]]>
Strict-Transport-Security, aussi connu sous le nom de HSTS-header, n'a pas été trouvé.]]>
- Ajoute l'en-tête 'Strict-Transport-Security' avec la valeur 'max-age=10886400; preload' à la section httpProtocol/customHeaders du fichier web.config. Utilisez cette correction uniquement si vos domaines vont fonctionner en https pour les 18 prochaines semaines (minimum).
+ Ajoute l'en-tête 'Strict-Transport-Security' avec la valeur 'max-age=10886400' à la section httpProtocol/customHeaders du fichier web.config. Utilisez cette correction uniquement si vos domaines vont fonctionner en https pour les 18 prochaines semaines (minimum).
L'en-tête HSTS a été ajouté dans votre fichier web.config.
X-XSS-Protection a été trouvé.]]>
X-XSS-Protection n'a pas été trouvé.]]>
diff --git a/src/Umbraco.Web.UI/Umbraco/config/lang/ru.xml b/src/Umbraco.Web.UI/Umbraco/config/lang/ru.xml
index 7698453b4a..5f138efc81 100644
--- a/src/Umbraco.Web.UI/Umbraco/config/lang/ru.xml
+++ b/src/Umbraco.Web.UI/Umbraco/config/lang/ru.xml
@@ -743,7 +743,7 @@
Значение, добавляющее заголовок, препятствующий использованию MIME-уязвимостей, успешно добавлено в файл web.config.
Strict-Transport-Security, известный также как HSTS-header, обнаружен.]]>
Strict-Transport-Security не найден.]]>
- Добавляет заголовок 'Strict-Transport-Security' и его значение 'max-age=10886400; preload' в секцию httpProtocol/customHeaders файла web.config. Применяйте этот способ только в случае, если доступ к Вашим сайтам будет осуществляться по протоколу https как минимум ближайшие 18 недель.
+ Добавляет заголовок 'Strict-Transport-Security' и его значение 'max-age=10886400' в секцию httpProtocol/customHeaders файла web.config. Применяйте этот способ только в случае, если доступ к Вашим сайтам будет осуществляться по протоколу https как минимум ближайшие 18 недель.
Заголовок HSTS-header успешно добавлен в файл web.config.
X-XSS-Protection обнаружен.]]>
X-XSS-Protection не найден.]]>
diff --git a/src/Umbraco.Web/HealthCheck/Checks/Security/HstsCheck.cs b/src/Umbraco.Web/HealthCheck/Checks/Security/HstsCheck.cs
index 18827b0c81..d0da243ced 100644
--- a/src/Umbraco.Web/HealthCheck/Checks/Security/HstsCheck.cs
+++ b/src/Umbraco.Web/HealthCheck/Checks/Security/HstsCheck.cs
@@ -6,17 +6,17 @@ namespace Umbraco.Web.HealthCheck.Checks.Security
[HealthCheck(
"E2048C48-21C5-4BE1-A80B-8062162DF124",
"Cookie hijacking and protocol downgrade attacks Protection (Strict-Transport-Security Header (HSTS))",
- Description = "Checks if your site, when running with HTTPS, contains the Strict-Transport-Security Header (HSTS). If not, it adds with a default of 100 days.",
+ Description = "Checks if your site, when running with HTTPS, contains the Strict-Transport-Security Header (HSTS). If not, it adds with a default of 18 weeks.",
Group = "Security")]
public class HstsCheck : BaseHttpHeaderCheck
{
// The check is mostly based on the instructions in the OWASP CheatSheet
- // (https://www.owasp.org/index.php/HTTP_Strict_Transport_Security_Cheat_Sheet)
+ // (https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.md)
// and the blog post of Troy Hunt (https://www.troyhunt.com/understanding-http-strict-transport/)
- // If you want do to it perfectly, you have to submit it https://hstspreload.appspot.com/,
+ // If you want do to it perfectly, you have to submit it https://hstspreload.org/,
// but then you should include subdomains and I wouldn't suggest to do that for Umbraco-sites.
public HstsCheck(IRuntimeState runtime, ILocalizedTextService textService)
- : base(runtime, textService, "Strict-Transport-Security", "max-age=10886400; preload", "hSTS", true)
+ : base(runtime, textService, "Strict-Transport-Security", "max-age=10886400", "hSTS", true)
{
}
}