Commit 328ea80c by Carl Bergquist Committed by GitHub

switches default value for security settings (#25175)

closes #25163
parent 3833aa41
...@@ -202,12 +202,12 @@ strict_transport_security_subdomains = false ...@@ -202,12 +202,12 @@ strict_transport_security_subdomains = false
# Set to true to enable the X-Content-Type-Options response header. # Set to true to enable the X-Content-Type-Options response header.
# The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised # The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised
# in the Content-Type headers should not be changed and be followed. The default will change to true in the next minor release, 6.3. # in the Content-Type headers should not be changed and be followed.
x_content_type_options = false x_content_type_options = true
# Set to true to enable the X-XSS-Protection header, which tells browsers to stop pages from loading # Set to true to enable the X-XSS-Protection header, which tells browsers to stop pages from loading
# when they detect reflected cross-site scripting (XSS) attacks. The default will change to true in the next minor release, 6.3. # when they detect reflected cross-site scripting (XSS) attacks.
x_xss_protection = false x_xss_protection = true
#################################### Snapshots ########################### #################################### Snapshots ###########################
......
...@@ -203,12 +203,12 @@ ...@@ -203,12 +203,12 @@
# Set to true to enable the X-Content-Type-Options response header. # Set to true to enable the X-Content-Type-Options response header.
# The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised # The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised
# in the Content-Type headers should not be changed and be followed. The default will change to true in the next minor release, 6.3. # in the Content-Type headers should not be changed and be followed.
;x_content_type_options = false ;x_content_type_options = true
# Set to true to enable the X-XSS-Protection header, which tells browsers to stop pages from loading # Set to true to enable the X-XSS-Protection header, which tells browsers to stop pages from loading
# when they detect reflected cross-site scripting (XSS) attacks. The default will change to true in the next minor release, 6.3. # when they detect reflected cross-site scripting (XSS) attacks.
;x_xss_protection = false ;x_xss_protection = true
#################################### Snapshots ########################### #################################### Snapshots ###########################
[snapshots] [snapshots]
......
...@@ -751,8 +751,8 @@ func (cfg *Cfg) Load(args *CommandLineArgs) error { ...@@ -751,8 +751,8 @@ func (cfg *Cfg) Load(args *CommandLineArgs) error {
AllowEmbedding = security.Key("allow_embedding").MustBool(false) AllowEmbedding = security.Key("allow_embedding").MustBool(false)
ContentTypeProtectionHeader = security.Key("x_content_type_options").MustBool(false) ContentTypeProtectionHeader = security.Key("x_content_type_options").MustBool(true)
XSSProtectionHeader = security.Key("x_xss_protection").MustBool(false) XSSProtectionHeader = security.Key("x_xss_protection").MustBool(true)
StrictTransportSecurity = security.Key("strict_transport_security").MustBool(false) StrictTransportSecurity = security.Key("strict_transport_security").MustBool(false)
StrictTransportSecurityMaxAge = security.Key("strict_transport_security_max_age_seconds").MustInt(86400) StrictTransportSecurityMaxAge = security.Key("strict_transport_security_max_age_seconds").MustInt(86400)
StrictTransportSecurityPreload = security.Key("strict_transport_security_preload").MustBool(false) StrictTransportSecurityPreload = security.Key("strict_transport_security_preload").MustBool(false)
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment