You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -154,13 +154,13 @@ For example, you can use this property in combination with [the `headers` proper
154
154
155
155
The `status` property defines the status code that Now should respond with when a path is requested.
156
156
157
-
For example, you can use this property in combination with [the `headers` property](#headers) to create a redirect with the initial status code of 301 (Moved Permanently).
157
+
For example, you can use this property in combination with [the `headers` property](#headers) to create a redirect with the initial status code of 308 (Moved Permanently).
Copy file name to clipboardExpand all lines: pages/docs/v2/network/encryption.mdx
+34-18
Original file line number
Diff line number
Diff line change
@@ -9,15 +9,15 @@ export const meta = {
9
9
title: 'Encryption',
10
10
description: 'Every ZEIT Now deployment is served of a HTTPS Connection.',
11
11
editUrl: 'pages/docs/v2/network/encryption.mdx',
12
-
lastEdited: '2019-08-21T15:24:05.000Z'
12
+
lastEdited: '2019-11-05T19:50:59.000Z'
13
13
}
14
14
15
15
Out of the box, every **Deployment** on ZEIT Now is served over an HTTPS connection. The [SSL](https://en.wikipedia.org/wiki/Transport_Layer_Security) certificates for these unique URLs are automatically generated free of charge.
16
16
17
-
Furthermore, any HTTP requests to your **Deployments** are automatically forwarded to HTTPS using the `301` status code:
17
+
Furthermore, any HTTP requests to your **Deployments** are automatically forwarded to HTTPS using the `308` status code:
18
18
19
19
```
20
-
HTTP/1.1 301 Moved Permanently
20
+
HTTP/1.1 308 Moved Permanently
21
21
Content-Type: text/plain
22
22
Location: https://<your-deployment-host>
23
23
```
@@ -38,38 +38,54 @@ It is not possible to disable this redirection or prevent the **Deployment** f
38
38
39
39
## Supported TLS Versions
40
40
41
-
ZEIT Now supports TLS version [1.2](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2).
41
+
ZEIT Now supports TLS version [1.2](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2) and TLS version [1.3](https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.3).
42
42
43
43
## Supported Ciphers
44
44
45
-
In order to ensure the integrity of the data received and sent by any **Deployment** running on the **ZEIT Now** platform, we only support ciphers with [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy).
45
+
In order to ensure the integrity of the data received and sent by any **Deployment** running on the **ZEIT Now** platform, we only support strong ciphers with [forward secrecy](https://en.wikipedia.org/wiki/Forward_secrecy).
46
46
47
47
The following cipher algorithms are supported:
48
48
49
-
- ECDH+AESGCM
50
-
- ECDH+AES256
51
-
- ECDH+AES128
52
-
- DH+3DES
53
-
- !ADH
54
-
- !AECDH
55
-
- !MD5
56
-
- !EDH-RSA-DES-CBC3-SHA
49
+
- TLS_AES_128_GCM_SHA256 (TLS 1.3)
50
+
- TLS_AES_256_GCM_SHA384 (TLS 1.3)
51
+
- TLS_CHACHA20_POLY1305_SHA256 (TLS 1.3)
52
+
- ECDHE-ECDSA-AES128-GCM-SHA256 (TLS 1.2)
53
+
- ECDHE-RSA-AES128-GCM-SHA256 (TLS 1.2)
54
+
- ECDHE-ECDSA-AES256-GCM-SHA384 (TLS 1.2)
55
+
- ECDHE-RSA-AES256-GCM-SHA384 (TLS 1.2)
56
+
- ECDHE-ECDSA-CHACHA20-POLY1305 (TLS 1.2)
57
+
- ECDHE-RSA-CHACHA20-POLY1305 (TLS 1.2)
58
+
- DHE-RSA-AES128-GCM-SHA256 (TLS 1.2)
59
+
- DHE-RSA-AES256-GCM-SHA384 (TLS 1.2)
60
+
61
+
This is the [recommended configuration from Mozilla](https://wiki.mozilla.org/Security/Server_Side_TLS#Intermediate_compatibility_.28recommended.29).
57
62
58
63
## Support for HSTS
59
64
60
-
Only the `.now.sh` domain (and therefore all of its sub domains, which are the unique URLs set when creating a deployment) support HSTS.
65
+
The `.now.sh` domain (and therefore all of its sub domains, which are the unique URLs set when creating a deployment) support HSTS automatically and are preloaded.
The default <InlineCode>Strict-Transport-Security</InlineCode> header for
73
+
*.now.sh
74
+
</Caption>
61
75
62
-
You can enable this by setting the `Strict-Transport-Security` ([more details](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security)) header to the following value in your **Deployment**:
76
+
Custom domains use HSTS, but only for the particular subdomain.
An example <InlineCode>Strict-Transport-Security</InlineCode> header enabling
70
-
HSTS.
83
+
The default <InlineCode>Strict-Transport-Security</InlineCode> header for
84
+
custom domains
71
85
</Caption>
72
86
87
+
You can modify this by setting the `Strict-Transport-Security` ([more details](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security)) header in your deployment.
88
+
73
89
Theoretically, you could set the `max-age` parameter to a different value (it indicates how long the client should remember that your site is only accessible over HTTPS), but since we do not allow connections made over HTTP, there is no point in setting it to a shorter value, as the client can just remember it forever.
0 commit comments