Referencing this: https://hstspreload.org/
There's a bunch of stuff about making really sure that it all works before you get them to pre-load it:
- when testing first test with a
max-age
of 5 minutes, then ramp up to 1 week, & 1 month. - They say if you're making a framework or library, then make
preload
be opt-IN.
I assume that this is mainly about people retro-fitting preloaded HSTS to existing systems, and then discovering that some legacy part of the system doesn't support HTTPS?
I'm creating a greenfield site in .NET Core (hosted on Azure). I think I should be able to develop everything in my site, in such a way that it supports HTTPS.
Are there any common bits of functionality or .NET /.NETCore libraries that don't support HTTPS, and thus might cause me a problem if I configured the preload up-front?
Very similar question, with a more SecurityTheory-targetted angle posted in the InformationSecurity Exchange: https://security.stackexchange.com/questions/201328/is-there-any-conceptual-downside-to-enabling-preloaded-hsts-on-greenfield