How to prevent "awselb/2.0" server information exposure in HTTP response header?

0

How to prevent "awselb/2.0" server information exposure in HTTP response header?

Enter image description here

Please provide a solution to the official exposure of "awselb/2.0" to the server response header on AWS.

Example) Option to remove http response header

  • Also, consider opening a support case, and express your use-case why you want to be able to override this header.

iwnoh
已提問 2 個月前檢視次數 579 次
2 個答案
2

Hi,

According to other re:post answers, It is not possible to configure the ELB to do not expose that header.

However, as a workaround, you can override the value using CloudFront edge functions.

profile picture
專家
已回答 2 個月前
profile picture
專家
已審閱 2 個月前
profile picture
專家
已審閱 2 個月前
profile picture
專家
已審閱 2 個月前
  • Note even when using. Cloudfront the alb will have to be public still(internet facing). Even if you could mask the server header the IP addresses are registered with AWS

0

It is not possible to hide this header directly on Application Load Balancer. Use Amazon CloudFront's Response Headers Policies instead. Please see my response to a similar question on re:Post, on How to prevent "awselb/2.0" server information exposure in HTTP response header.

AWS
Piotrek
已回答 14 天前

您尚未登入。 登入 去張貼答案。

一個好的回答可以清楚地回答問題並提供建設性的意見回饋,同時有助於提問者的專業成長。

回答問題指南