context.Request.IsSecureConnection
Always returns false in an Azure deployment even when the connection is being served over HTTPS. After looking through the headers sent for an Azure deployed site I've found:
X-Forwarded-Proto=https
Does this header guarantee that the client connection to the website is under HTTPS in the same way that context.Request.IsSecureConnection
does?
These TLS/SSL certificates can be stored in Azure Key Vault, and allow secure deployments of certificates to Windows virtual machines (VMs) in Azure. To learn more on how to Secure a web server on a Windows virtual machine in Azure with TLS/SSL certificates stored in Key Vault you can refer to this article as well.
In the Azure portal, from the left menu, select App Services > <app-name>. From your app's navigation menu, select TLS/SSL settings > Private Key Certificates (. pfx) > Import App Service Certificate. Select the certificate that you just purchased, and then select OK.
SSL offloading is the process of removing the SSL based encryption from incoming traffic that a web server receives to relieve it from decryption of data.
In the Azure portal, from the left menu, select App Services > <app-name>. From the left navigation of your app, start the TLS/SSL Binding dialog by: Selecting Custom domains > Add binding. Selecting TLS/SSL settings > Add TLS/SSL binding.
The custom check referred to in my answer is no longer required for ASP.NET on .NET Framework 4.7 and ASP.NET Core 2.0.
Both HttpContext.Request.IsHttps
(Core) and HttpContext.Request.IsSecureConnection
will return True
if the request originated over HTTPS in Azure App Service.
That's what i tested with, it may have happened sooner in the life of those stacks (e.g. .NET Framework 4.6.x). You should be fine in any case since App Service now runs your application on top of .NET Framework 4.7.
You most probably have to make the check for any other programming stack.
I'm not asking how to force HTTPS, I'm asking why in Azure deployment is
context.Request.IsSecureConnection
returningfalse
even when the request is over HTTPS.
Here's why:
The Azure App Service frontend layer TERMINATES the TLS channel (aka TLS offloading) and opens a new plain HTTP connection to your Web Worker, where your code lives. Routing is performed by ARR (Application Request Routing).
Source:
https://channel9.msdn.com/Events/TechEd/NorthAmerica/2012/AZR305
(View slides, Slide 12)
Therefore, from the point of view of your code every single request is "insecure".
X-Forwarded-Proto=https
hints about the original request (that hit the frontends).
If checks have to be made, make them against X-ARR-SSL
instead.
ARR is attaching a special request header to every request that arrives over HTTPS. The value contained in X-ARR-SSL
provides information about the TLS server certificate that was used to secure the TCP connection between the client (i.e. browser) and the ARR frontend.
e.g.:
X-ARR-SSL: 2048|256|C=US, S=Washington, L=Redmond, O=Microsoft Corporation,
OU=Microsoft IT, CN=Microsoft IT SSL SHA2|CN=*.azurewebsites.net
A whole more info around that here:
https://tomasz.janczuk.org/2013/12/secure-by-default-with-ssl-in-windows.html
Tomasz is the author of the iisnode project, which is the mechanism for running Node applications on IIS in Azure App Service.
App Service uses Application Request Routing, which is also the point where TLS is terminated. Since the traffic that hits your web worker will then be plain HTTP, you need to check this header to tell if the request originated over TLS:
if (request.headers['x-arr-ssl'])
{
// We're good
}
else
{
// Request made over plain HTTP
}
If you're running on .NET Framework 4.7 or .NET Core 2.0, you do not need to make this check, there's baked in logic to return the correct value for HttpContext.Request.IsSecureConnection
and HttpContext.Request.IsHttps
(.NET Core).
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With