diff options
author | Yves Senn <yves.senn@gmail.com> | 2015-08-21 09:24:35 +0200 |
---|---|---|
committer | Yves Senn <yves.senn@gmail.com> | 2015-08-21 09:24:35 +0200 |
commit | acb2b07ebdfcf8f683b90a0e5de0558ae0f20259 (patch) | |
tree | 1cfe662afa8d1ce6faff15fcadfc42c2ac78e7ea /guides/source | |
parent | 90bb73781128bd1ce1b1059bb173b8e1cf310e3a (diff) | |
parent | 0b18876e153d96f2bda0e1762a32c29235004398 (diff) | |
download | rails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.tar.gz rails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.tar.bz2 rails-acb2b07ebdfcf8f683b90a0e5de0558ae0f20259.zip |
Merge pull request #21312 from piton4eg/patch-7
Small fixes [ci skip]
Diffstat (limited to 'guides/source')
-rw-r--r-- | guides/source/security.md | 18 |
1 files changed, 6 insertions, 12 deletions
diff --git a/guides/source/security.md b/guides/source/security.md index 21cf48c2cf..850d111bd7 100644 --- a/guides/source/security.md +++ b/guides/source/security.md @@ -1014,18 +1014,12 @@ config.action_dispatch.default_headers.clear Here is a list of common headers: -* X-Frame-Options -_'SAMEORIGIN' in Rails by default_ - allow framing on same domain. Set it to 'DENY' to deny framing at all or 'ALLOWALL' if you want to allow framing for all website. -* X-XSS-Protection -_'1; mode=block' in Rails by default_ - use XSS Auditor and block page if XSS attack is detected. Set it to '0;' if you want to switch XSS Auditor off(useful if response contents scripts from request parameters) -* X-Content-Type-Options -_'nosniff' in Rails by default_ - stops the browser from guessing the MIME type of a file. -* X-Content-Security-Policy -[A powerful mechanism for controlling which sites certain content types can be loaded from](http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html) -* Access-Control-Allow-Origin -Used to control which sites are allowed to bypass same origin policies and send cross-origin requests. -* Strict-Transport-Security -[Used to control if the browser is allowed to only access a site over a secure connection](http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) +* **X-Frame-Options:** _'SAMEORIGIN' in Rails by default_ - allow framing on same domain. Set it to 'DENY' to deny framing at all or 'ALLOWALL' if you want to allow framing for all website. +* **X-XSS-Protection:** _'1; mode=block' in Rails by default_ - use XSS Auditor and block page if XSS attack is detected. Set it to '0;' if you want to switch XSS Auditor off(useful if response contents scripts from request parameters) +* **X-Content-Type-Options:** _'nosniff' in Rails by default_ - stops the browser from guessing the MIME type of a file. +* **X-Content-Security-Policy:** [A powerful mechanism for controlling which sites certain content types can be loaded from](http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html) +* **Access-Control-Allow-Origin:** Used to control which sites are allowed to bypass same origin policies and send cross-origin requests. +* **Strict-Transport-Security:** [Used to control if the browser is allowed to only access a site over a secure connection](http://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) Environmental Security ---------------------- |