diff options
author | Jan Dittberner <jandd@cacert.org> | 2016-05-08 22:20:15 +0200 |
---|---|---|
committer | Jan Dittberner <jandd@cacert.org> | 2016-05-08 22:20:15 +0200 |
commit | 246d28b181c69091386369a04ec1797902991520 (patch) | |
tree | 09cce4bcaa3623f1c4fa8579594dc3371ee083df /docs/configdiff/bugs | |
parent | 0c8e90c9ff94bbaef05afd7e0a06c3096d3e022e (diff) | |
download | cacert-infradocs-246d28b181c69091386369a04ec1797902991520.tar.gz cacert-infradocs-246d28b181c69091386369a04ec1797902991520.tar.xz cacert-infradocs-246d28b181c69091386369a04ec1797902991520.zip |
Add bugs container description
Diffstat (limited to 'docs/configdiff/bugs')
-rw-r--r-- | docs/configdiff/bugs/apache/bugs-apache-config.diff | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/docs/configdiff/bugs/apache/bugs-apache-config.diff b/docs/configdiff/bugs/apache/bugs-apache-config.diff new file mode 100644 index 0000000..355b796 --- /dev/null +++ b/docs/configdiff/bugs/apache/bugs-apache-config.diff @@ -0,0 +1,47 @@ +diff -urw -X .bugs_etc_ignore orig/etc/apache2/conf-available/security.conf bugs/etc/apache2/conf-available/security.conf +--- orig/etc/apache2/conf-available/security.conf 2015-11-28 13:59:22.000000000 +0100 ++++ bugs/etc/apache2/conf-available/security.conf 2016-05-08 14:04:46.335145675 +0200 +@@ -5,11 +5,11 @@ + # This currently breaks the configurations that come with some web application + # Debian packages. + # +-#<Directory /> +-# AllowOverride None +-# Order Deny,Allow +-# Deny from all +-#</Directory> ++<Directory /> ++ AllowOverride None ++ Order Deny,Allow ++ Deny from all ++</Directory> + + + # Changing the following options will not really affect the security of the +@@ -61,14 +61,24 @@ + # else than declared by the content type in the HTTP headers. + # Requires mod_headers to be enabled. + # +-#Header set X-Content-Type-Options: "nosniff" ++Header set X-Content-Type-Options: "nosniff" ++ ++# ++# Some browsers have a built-in XSS filter that will detect some cross site ++# scripting attacks. By default, these browsers modify the suspicious part of ++# the page and display the result. This behavior can create various problems ++# including new security issues. This header will tell the XSS filter to ++# completely block access to the page instead. ++# Requires mod_headers to be enabled. ++# ++Header set X-XSS-Protection: "1; mode=block" + + # + # Setting this header will prevent other sites from embedding pages from this + # site as frames. This defends against clickjacking attacks. + # Requires mod_headers to be enabled. + # +-#Header set X-Frame-Options: "sameorigin" ++Header set X-Frame-Options: "sameorigin" + + + # vim: syntax=apache ts=4 sw=4 sts=4 sr noet |