summaryrefslogtreecommitdiffstats
path: root/lib/private/response.php
diff options
context:
space:
mode:
authorLukas Reschke <lukas@owncloud.com>2016-01-11 21:20:42 +0100
committerLukas Reschke <lukas@owncloud.com>2016-01-12 10:37:16 +0100
commit4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6 (patch)
tree425251b10adc5a1d8791ce658f10a0058bf16a4d /lib/private/response.php
parent3317dd0a8e2ca265172d53a16f9241f3351aa3b8 (diff)
downloadnextcloud-server-4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6.tar.gz
nextcloud-server-4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6.zip
Add X-Download-Options and X-Permitted-Cross-Domain-Policies
Two small security hardenings for our IE users and those with Adobe products. Aligns it more with https://github.com/twitter/secureheaders#secureheaders---
Diffstat (limited to 'lib/private/response.php')
-rw-r--r--lib/private/response.php2
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/private/response.php b/lib/private/response.php
index b0eb8adc4d5..44847466fa3 100644
--- a/lib/private/response.php
+++ b/lib/private/response.php
@@ -260,6 +260,8 @@ class OC_Response {
header('X-Content-Type-Options: nosniff'); // Disable sniffing the content type for IE
header('X-Frame-Options: Sameorigin'); // Disallow iFraming from other domains
header('X-Robots-Tag: none'); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag
+ header('X-Download-Options: noopen'); // https://msdn.microsoft.com/en-us/library/jj542450(v=vs.85).aspx
+ header('X-Permitted-Cross-Domain-Policies: none'); // https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html
}
}