<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent in Troubleshooting</title>
    <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/ta-p/215617</link>
    <description>&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security Team is asking to "enable HSTS", is alerting that "HSTS is missing",&amp;nbsp;&lt;SPAN&gt;"Strict Transport Security Not Enforced",&lt;/SPAN&gt;&amp;nbsp;or that the "Strict Transport Security header is not present in the response" for Dynatrace ActiveGate, Managed, RUM or OneAgent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Issue&lt;/TH&gt;
&lt;TH&gt;Solution&lt;/TH&gt;
&lt;TH&gt;Tasks&lt;/TH&gt;
&lt;TH&gt;Alternative(s)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Security concern regarding HSTS (HTTP Strict Transport Security) for ActiveGate, Managed or OneAgent&lt;/TD&gt;
&lt;TD&gt;Explain that HSTS is not applicable here - see below&lt;/TD&gt;
&lt;TD&gt;Check below information and explain it to your Security Team&lt;/TD&gt;
&lt;TD&gt;Submit a support ticket if you need additional details or you face a different scenario&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;First of all, a quick recap of what the HSTS (HTTP Strict Transport Security) header is all about (taken from the RFC&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://tools.ietf.org/html/rfc6797#section-2.2" target="_blank" rel="noopener noreferrer"&gt;https://tools.ietf.org/html/rfc6797#section-2.2&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;or also explained on Wikipedia&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank" rel="noopener noreferrer"&gt;https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the HSTS header is set in an HTTPS response, the User Agent (= Browser) should from then on only use trusted HTTPS connections for all requests to the same host for the specified amount of time.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;We do not support enabling HSTS on Dynatrace Managed cluster nodes or on ActiveGates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="zd-indent"&gt;
&lt;P&gt;HSTS is in general for public Internet servers, and in general, Dynatrace Managed cluster nodes are internal-only servers. User browsers should not be connecting directly to ActiveGates in most use cases, and certainly not as a primary connection.&lt;BR /&gt;Note: To avoid showing up in security scans, Dynatrace adds HSTS for those ActiveGate endpoints: Environment API v1, Environment API v2, Configuration API, State API (/rest/state, /rest/health).&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RUM: Since &lt;A href="https://docs.dynatrace.com/docs/whats-new/activegate/sprint-303" target="_blank"&gt;ActiveGate v1.303&lt;/A&gt;&amp;nbsp;the HTTP response header &lt;/SPAN&gt;&lt;CODE class="_ca0qyh40 _u5f3m5ip _n3tdyh40 _19bvm5ip _2rko1sit _11c81u0j _1reo1wug _18m91wug _1dqoglyw _1e0c1nu9 _bfhktkvp _16d9qvcn _syaz1fxt _vwz41kw7 _1i4q1hna _o5721jtm" data-renderer-mark="true"&gt;Strict-Transport-Security&lt;/CODE&gt;&lt;SPAN&gt; is added to all beacon requests. For HTTP beacon requests, the header is ignored see&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-inline-card="true" data-card-url="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security#description"&gt;&lt;SPAN class="loader-wrapper"&gt;&lt;A class="_1yt4x7n9 _2rkoiti9 _v56415x0 _1e0c1nu9 _16d9qvcn _syaz1y58 _1rkwglyw _4cvxmr28 _19ith6cr _bfhkhp5a _1a3b18uv _4fprglyw _5goinqa1 _9oik18uv _1bnxglyw _jf4cnqa1 _1nrm18uv _c2waglyw _1iohnqa1 _uizt1kdv _nt751r31 _49pcglyw _1hvw1o36 _1372tlke _7ehicw00 _1j5pglyw _1di629zg" tabindex="0" role="button" href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Strict-Transport-Security#description" target="_self" data-testid="inline-card-resolved-view"&gt;&lt;SPAN class="_19itglyw _vchhusvi _r06hglyw _o5721jtm _1nmz9jpi _16d9qvcn _ca0qv77o _u5f31b66 _n3tdv77o _19bv1b66" data-testid="inline-card-icon-and-title"&gt;&lt;SPAN class="_19itglyw _vchhusvi _r06hglyw"&gt;Strict-Transport-Security - HTTP | MDN&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As a last remark, the Dynatrace OneAgent is not aware of the HTTP server/app server configuration, so it doesn't know if HSTS is generally enabled or not. The Agent cannot know for sure, because this header could potentially also be added on another network device (reverse proxy, load balancer,...).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;For this reason, OneAgent cannot add this header as it would tell the HTTP client to only send requests via HTTPS to this site from then on. This could potentially break the web application if it's not designed to serve all requests via HTTPS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 26 May 2025 08:29:57 GMT</pubDate>
    <dc:creator>stefanie_pachne</dc:creator>
    <dc:date>2025-05-26T08:29:57Z</dc:date>
    <item>
      <title>VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/ta-p/215617</link>
      <description>&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Security Team is asking to "enable HSTS", is alerting that "HSTS is missing",&amp;nbsp;&lt;SPAN&gt;"Strict Transport Security Not Enforced",&lt;/SPAN&gt;&amp;nbsp;or that the "Strict Transport Security header is not present in the response" for Dynatrace ActiveGate, Managed, RUM or OneAgent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH&gt;Issue&lt;/TH&gt;
&lt;TH&gt;Solution&lt;/TH&gt;
&lt;TH&gt;Tasks&lt;/TH&gt;
&lt;TH&gt;Alternative(s)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;Security concern regarding HSTS (HTTP Strict Transport Security) for ActiveGate, Managed or OneAgent&lt;/TD&gt;
&lt;TD&gt;Explain that HSTS is not applicable here - see below&lt;/TD&gt;
&lt;TD&gt;Check below information and explain it to your Security Team&lt;/TD&gt;
&lt;TD&gt;Submit a support ticket if you need additional details or you face a different scenario&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;First of all, a quick recap of what the HSTS (HTTP Strict Transport Security) header is all about (taken from the RFC&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://tools.ietf.org/html/rfc6797#section-2.2" target="_blank" rel="noopener noreferrer"&gt;https://tools.ietf.org/html/rfc6797#section-2.2&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;or also explained on Wikipedia&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank" rel="noopener noreferrer"&gt;https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security&lt;/A&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the HSTS header is set in an HTTPS response, the User Agent (= Browser) should from then on only use trusted HTTPS connections for all requests to the same host for the specified amount of time.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;We do not support enabling HSTS on Dynatrace Managed cluster nodes or on ActiveGates.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="zd-indent"&gt;
&lt;P&gt;HSTS is in general for public Internet servers, and in general, Dynatrace Managed cluster nodes are internal-only servers. User browsers should not be connecting directly to ActiveGates in most use cases, and certainly not as a primary connection.&lt;BR /&gt;Note: To avoid showing up in security scans, Dynatrace adds HSTS for those ActiveGate endpoints: Environment API v1, Environment API v2, Configuration API, State API (/rest/state, /rest/health).&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;RUM: Since &lt;A href="https://docs.dynatrace.com/docs/whats-new/activegate/sprint-303" target="_blank"&gt;ActiveGate v1.303&lt;/A&gt;&amp;nbsp;the HTTP response header &lt;/SPAN&gt;&lt;CODE class="_ca0qyh40 _u5f3m5ip _n3tdyh40 _19bvm5ip _2rko1sit _11c81u0j _1reo1wug _18m91wug _1dqoglyw _1e0c1nu9 _bfhktkvp _16d9qvcn _syaz1fxt _vwz41kw7 _1i4q1hna _o5721jtm" data-renderer-mark="true"&gt;Strict-Transport-Security&lt;/CODE&gt;&lt;SPAN&gt; is added to all beacon requests. For HTTP beacon requests, the header is ignored see&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-inline-card="true" data-card-url="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security#description"&gt;&lt;SPAN class="loader-wrapper"&gt;&lt;A class="_1yt4x7n9 _2rkoiti9 _v56415x0 _1e0c1nu9 _16d9qvcn _syaz1y58 _1rkwglyw _4cvxmr28 _19ith6cr _bfhkhp5a _1a3b18uv _4fprglyw _5goinqa1 _9oik18uv _1bnxglyw _jf4cnqa1 _1nrm18uv _c2waglyw _1iohnqa1 _uizt1kdv _nt751r31 _49pcglyw _1hvw1o36 _1372tlke _7ehicw00 _1j5pglyw _1di629zg" tabindex="0" role="button" href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Strict-Transport-Security#description" target="_self" data-testid="inline-card-resolved-view"&gt;&lt;SPAN class="_19itglyw _vchhusvi _r06hglyw _o5721jtm _1nmz9jpi _16d9qvcn _ca0qv77o _u5f31b66 _n3tdv77o _19bv1b66" data-testid="inline-card-icon-and-title"&gt;&lt;SPAN class="_19itglyw _vchhusvi _r06hglyw"&gt;Strict-Transport-Security - HTTP | MDN&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As a last remark, the Dynatrace OneAgent is not aware of the HTTP server/app server configuration, so it doesn't know if HSTS is generally enabled or not. The Agent cannot know for sure, because this header could potentially also be added on another network device (reverse proxy, load balancer,...).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;For this reason, OneAgent cannot add this header as it would tell the HTTP client to only send requests via HTTPS to this site from then on. This could potentially break the web application if it's not designed to serve all requests via HTTPS.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 26 May 2025 08:29:57 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/ta-p/215617</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2025-05-26T08:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate or Managed</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215719#M257</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;for sharing this!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2023 20:35:48 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215719#M257</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2023-06-21T20:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate or Managed</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215726#M258</link>
      <description>&lt;P&gt;Bookmarked, thanks for this.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jun 2023 21:19:28 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215726#M258</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2023-06-21T21:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate or Managed</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215741#M259</link>
      <description>&lt;P&gt;Thanks for sharing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 07:13:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/215741#M259</guid>
      <dc:creator>Romanenkov_Al3x</dc:creator>
      <dc:date>2023-06-22T07:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256907#M735</link>
      <description>&lt;P&gt;thanks for sharing,&lt;/P&gt;&lt;P&gt;for more clarification, is there is any way to&amp;nbsp;&lt;SPAN&gt;enable HSTS for Dynatrace managed cluster?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 07:11:01 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256907#M735</guid>
      <dc:creator>IslamEsmail</dc:creator>
      <dc:date>2024-09-24T07:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256918#M736</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/68530"&gt;@IslamEsmail&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;We consider this a false positive alert because&amp;nbsp;&lt;SPAN&gt;HSTS is in general for public Internet servers. Dynatrace Managed cluster nodes are considered internal-only servers.&amp;nbsp;&lt;/SPAN&gt;Thus, w&lt;SPAN&gt;e do not support enabling HSTS on Dynatrace Managed cluster nodes.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Does this help?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 07:59:37 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256918#M736</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2024-09-24T07:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256921#M737</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for clarification , and yes for me its help, lets see how it goes with the security geeks&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 08:06:25 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/256921#M737</guid>
      <dc:creator>IslamEsmail</dc:creator>
      <dc:date>2024-09-24T08:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/276275#M901</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;: how about Cluster ActiveGates serving as the public endpoint? They receive mobile device traffic from the internet. If there is an upstream load balancer in front of them, then it is not a problem, if HSTS can not be enabled on those ActiveGates?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Apr 2025 09:10:54 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/276275#M901</guid>
      <dc:creator>AndrasKovacs</dc:creator>
      <dc:date>2025-04-30T09:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: VA scan shows HSTS vulnerability for ActiveGate, Managed or OneAgent</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/276960#M904</link>
      <description>&lt;P&gt;In AG 1.303, HSTS has been enabled on the RUM endpoints.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 15:49:43 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-HSTS-vulnerability-for-ActiveGate-Managed-or/tac-p/276960#M904</guid>
      <dc:creator>Zbigniew_Wroble</dc:creator>
      <dc:date>2025-05-12T15:49:43Z</dc:date>
    </item>
  </channel>
</rss>

