diff options
author | Lukas Reschke <lukas@owncloud.com> | 2016-01-11 21:20:42 +0100 |
---|---|---|
committer | Lukas Reschke <lukas@owncloud.com> | 2016-01-12 10:37:16 +0100 |
commit | 4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6 (patch) | |
tree | 425251b10adc5a1d8791ce658f10a0058bf16a4d /lib/private/response.php | |
parent | 3317dd0a8e2ca265172d53a16f9241f3351aa3b8 (diff) | |
download | nextcloud-server-4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6.tar.gz nextcloud-server-4d0dcd3c53a4c8c9944bc23d41de71593c3bd5d6.zip |
Add X-Download-Options and X-Permitted-Cross-Domain-Policies
Two small security hardenings for our IE users and those with Adobe products. Aligns it more with https://github.com/twitter/secureheaders#secureheaders---
Diffstat (limited to 'lib/private/response.php')
-rw-r--r-- | lib/private/response.php | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/lib/private/response.php b/lib/private/response.php index b0eb8adc4d5..44847466fa3 100644 --- a/lib/private/response.php +++ b/lib/private/response.php @@ -260,6 +260,8 @@ class OC_Response { header('X-Content-Type-Options: nosniff'); // Disable sniffing the content type for IE header('X-Frame-Options: Sameorigin'); // Disallow iFraming from other domains header('X-Robots-Tag: none'); // https://developers.google.com/webmasters/control-crawl-index/docs/robots_meta_tag + header('X-Download-Options: noopen'); // https://msdn.microsoft.com/en-us/library/jj542450(v=vs.85).aspx + header('X-Permitted-Cross-Domain-Policies: none'); // https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html } } |