Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/roundcube/roundcubemail.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRotzbua <Rotzbua@users.noreply.github.com>2016-02-13 19:28:56 +0300
committerRotzbua <Rotzbua@users.noreply.github.com>2016-02-13 19:28:56 +0300
commit7b4f71777e404128514c4255c2fc752bbfaaeca6 (patch)
tree591f1a397be87048eb632eb6303b8c87211b2aad /.htaccess
parenta62ff159f0ae72d2794ab538dfc1848bdf5504a4 (diff)
add optional security header to .htaccess
actually most widely used optional header all options only commented, they should be adusted to your intallation / user environment
Diffstat (limited to '.htaccess')
-rw-r--r--.htaccess27
1 files changed, 27 insertions, 0 deletions
diff --git a/.htaccess b/.htaccess
index 59e5dcae6..50b183ce2 100644
--- a/.htaccess
+++ b/.htaccess
@@ -46,7 +46,34 @@ SetOutputFilter DEFLATE
<IfModule mod_headers.c>
# replace 'append' with 'merge' for Apache version 2.2.9 and later
#Header append Cache-Control public env=!NO_CACHE
+
+# Optional security header
+# Only increased security if the browser support those features
+# Be careful! Testing is required! They should be adusted to your intallation / user environment
+
+# HSTS - HTTP Strict Transport Security
+#Header always set Strict-Transport-Security "max-age=31536000; preload" env=HTTPS
+
+# HPKP - HTTP Public Key Pinning
+# Only template - fill with your values
+#Header always set Public-Key-Pins "max-age=3600; report-uri=\"\"; pin-sha256=\"\"; pin-sha256=\"\"" env=HTTPS
+
+# X-Xss-Protection
+# This header is used to configure the built in reflective XSS protection found in Internet Explorer, Chrome and Safari (Webkit).
+#Header set X-XSS-Protection "1; mode=block"
+
+# X-Frame-Options
+# The X-Frame-Options header (RFC), or XFO header, protects your visitors against clickjacking attacks
+# Already set by php code! Do not activate both options
+#Header set X-Frame-Options SAMEORIGIN
+
+# X-Content-Type-Options
+# It prevents Google Chrome and Internet Explorer from trying to mime-sniff the content-type of a response away from the one being declared by the server.
+#Header set X-Content-Type-Options: "nosniff"
+
+# CSP - Content Security Policy
# for better privacy/security ask browsers to not set the Referer
+# more flags for script, stylesheets and images available, read RFC for more information
#Header set Content-Security-Policy "referrer no-referrer"
</IfModule>