File tree Expand file tree Collapse file tree 2 files changed +14
-13
lines changed
Expand file tree Collapse file tree 2 files changed +14
-13
lines changed Original file line number Diff line number Diff line change 1111
1212 <IfModule mod_env.c >
1313 # Add security and privacy related headers
14- Header set X-Content-Type-Options "nosniff"
15- Header set X-XSS-Protection "1 ; mode=block"
16- Header set X-Robots-Tag "none"
17- Header set X-Download-Options "noopen"
18- Header set X-Permitted-Cross-Domain-Policies "none"
19- Header set Referrer-Policy "no-referrer"
14+ Header always set Referrer-Policy "no-referrer"
15+ Header always set X-Content-Type-Options "nosniff"
16+ Header always set X-Download-Options "noopen"
17+ Header always set X-Frame-Options "SAMEORIGIN"
18+ Header always set X-Permitted-Cross-Domain-Policies "none"
19+ Header always set X-Robots-Tag "none"
20+ Header always set X-XSS-Protection "1 ; mode=block"
2021 SetEnv modHeadersAvailable true
2122 </IfModule >
2223
4041</IfModule >
4142<IfModule mod_rewrite.c >
4243 RewriteEngine on
43- RewriteCond %{HTTP_USER_AGENT} DavClnt
44- RewriteRule ^$ /remote.php/webdav/ [L,R=302 ]
44+ RewriteCond %{HTTP_USER_AGENT} DavClnt
45+ RewriteRule ^$ /remote.php/webdav/ [L,R=302 ]
4546 RewriteRule .* - [env=HTTP_AUTHORIZATION:%{HTTP:Authorization }]
4647 RewriteRule ^\.well-known/host-meta /public.php?service=host-meta [QSA,L]
4748 RewriteRule ^\.well-known/host-meta\.json /public.php?service=host-meta-json [QSA,L]
Original file line number Diff line number Diff line change @@ -89,22 +89,22 @@ public static function addSecurityHeaders() {
8989 . 'frame-src *; '
9090 . 'img-src * data: blob:; '
9191 . 'font-src \'self \' data:; '
92- . 'media-src *; '
92+ . 'media-src *; '
9393 . 'connect-src *; '
9494 . 'object-src \'none \'; '
9595 . 'base-uri \'self \'; ' ;
9696 header ('Content-Security-Policy: ' . $ policy );
97- header ('X-Frame-Options: SAMEORIGIN ' ); // Disallow iFraming from other domains
9897
9998 // Send fallback headers for installations that don't have the possibility to send
10099 // custom headers on the webserver side
101100 if (getenv ('modHeadersAvailable ' ) !== 'true ' ) {
102- header ('X-XSS-Protection: 1; mode=block ' ); // Enforce browser based XSS filters
101+ header ('Referrer-Policy: no-referrer ' ); // https://www.w3.org/TR/referrer-policy/
103102 header ('X-Content-Type-Options: nosniff ' ); // Disable sniffing the content type for IE
104- header ('X-Robots-Tag: none ' ); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
105103 header ('X-Download-Options: noopen ' ); // https://msdn.microsoft.com/en-us/library/jj542450(v=vs.85).aspx
104+ header ('X-Frame-Options: SAMEORIGIN ' ); // Disallow iFraming from other domains
106105 header ('X-Permitted-Cross-Domain-Policies: none ' ); // https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html
107- header ('Referrer-Policy: no-referrer ' ); // https://www.w3.org/TR/referrer-policy/
106+ header ('X-Robots-Tag: none ' ); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
107+ header ('X-XSS-Protection: 1; mode=block ' ); // Enforce browser based XSS filters
108108 }
109109 }
110110
You can’t perform that action at this time.
0 commit comments