Go to file
2018-04-19 18:45:58 +02:00
conf Rename create_vhost_php.sh to create_vhost.sh. Add support for vhost configuration for redirecting sites. 2017-11-23 19:58:35 +01:00
OLD Rename create_vhost_php.sh to create_vhost.sh. Add support for vhost configuration for redirecting sites. 2017-11-23 19:58:35 +01:00
.gitignore handle_domain_on_webserver.sh: first version ready for usage. 2017-08-13 18:37:34 +02:00
add_custom_log_to_vhost.sh Initial import 2017-02-21 02:20:36 +01:00
add_https_to_vhosts.sh Initial import 2017-02-21 02:20:36 +01:00
apache_memory_usage.sh Initial import 2017-02-21 02:20:36 +01:00
archive_logfiles.sh Add script 'archive_logfiles.sh'. 2017-07-03 15:29:17 +02:00
check_domain_on_webserver.sh Add script 'handle_domain_on_webserver.sh' with symlinks 'check_domain_on_webserver.sh' and 'show_domain_on_webserver.sh'. 2017-07-05 02:38:59 +02:00
convert_vhosts_2.4.sh Initial import 2017-02-21 02:20:36 +01:00
create_summary_websites.sh - Add support of 'parked' domain/site. 2018-02-06 17:42:52 +01:00
create_vhost.sh SSLCertificateChainFile is deprecated. So don't warn, if actual configuration does not contain this rule. 2018-04-19 18:45:58 +02:00
delete_domain_related_configurations.sh handle_domain_on_webserver.sh: first version ready for usage. 2017-08-13 18:37:34 +02:00
handle_domain_on_webserver.sh Add checks for cms 'drupal' and 'redaxo'. 2017-09-19 19:29:14 +02:00
max_memory_limit_apache.sh Initial import 2017-02-21 02:20:36 +01:00
README.HTTP-security-headers Add Readme for HTTP security headers. 2018-03-15 16:28:23 +01:00
show_domain_on_webserver.sh Add script 'handle_domain_on_webserver.sh' with symlinks 'check_domain_on_webserver.sh' and 'show_domain_on_webserver.sh'. 2017-07-05 02:38:59 +02:00

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

   # ==========
   # - HTTP security Headers
   # ==========

   # You can mitigate most of the common Cross Site Scripting attack using HttpOnly 
   # and Secure flag in a cookie. Without having HttpOnly and Secure, it is possible 
   # to steal or manipulate web application session and cookies and its dangerous.
   #
   #Header always edit Set-Cookie (.*) "$1;HttpOnly;Secure"

   # - X-Frame-Options
   # -
   # - The X-Frame-Options header (RFC), or XFO header, protects your visitors 
   # - against clickjacking attacks. An attacker can load up an iframe on their 
   # - site and set your site as the source, it's quite easy: 
   # -
   # -    <iframe src="https://scotthelme.co.uk"></iframe>
   # -
   # - Using some crafty CSS they can hide your site in the background and create some 
   # - genuine looking overlays. When your visitors click on what they think is a harmless 
   # - link, they're actually clicking on links on your website in the background. That 
   # - might not seem so bad until we realise that the browser will execute those requests 
   # - in the context of the user, which could include them being logged in and authenticated 
   # - to your site!
   # -
   # - Troy Hunt has a great blog on 'Clickjack attack  the hidden threat right in front :
   # - of you':
   # -
   # -    http://www.troyhunt.com/2013/05/clickjack-attack-hidden-threat-right-in.html
   # -
   # - Valid values include DENY meaning your site can't be framed, SAMEORIGIN which allows 
   # - you to frame your own site or ALLOW-FROM https://example.com/ which lets you specify 
   # - sites that are permitted to frame your own site.
   # -
   # - Note:
   # - For Apache 2.2 use
   # -    Header always set X-Frame-Options "SAMEORIGIN"
   # -
   #Header always append X-Frame-Options "SAMEORIGIN"

   # -  X-Xss-Protection
   # -
   # - This header is used to configure the built in reflective XSS protection found 
   # - in Internet Explorer, Chrome and Safari (Webkit). Valid settings for the header 
   # - are 0, which disables the protection, 1 which enables the protection 
   # - and 1; mode=block which tells the browser to block the response if it 
   # - detects an attack rather than sanitising the script.
   # -
   #Header always set X-Xss-Protection "1; mode=block"

   # - X-Content-Type-Options
   # -
   # - Nice and easy to configure, this header only has one valid value, nosniff. 
   # - It prevents Google Chrome and Internet Explorer from trying to mime-sniff 
   # - the content-type of a response away from the one being declared by the server. 
   # - It reduces exposure to drive-by downloads and the risks of user uploaded content 
   # - that, with clever naming, could be treated as a different content-type, like 
   # - an executable.
   # -
   #Header always set X-Content-Type-Options "nosniff"

   # - Content Security Policy
   # -
   # - The CSP header allows you to define a whitelist of approved sources of content 
   # - for your site. By restricting the assets that a browser can load for your site, 
   # - like js and css, CSP can act as an effective countermeasure to XSS attacks. I 
   # - have covered CSP in a lot more detail in my blog Content Security Policy - An 
   # - Introduction (https://scotthelme.co.uk/content-security-policy-an-introduction/). 
   # -
   # - Here is a basic policy to enforce TLS on all assets and prevent 
   # - mixed content warnings.
	# -
   # - Allow Google Analytics, Google AJAX CDN and Same Origin
   # -    script-src 'self' www.google-analytics.com ajax.googleapis.com;
   # -
   # - Emmbedding Google Fonts
   # -    style-src 'self' 'unsafe-inline' https://fonts.googleapis.com; 
   # -
   # - Allow YouTube Videos (iframe embedded) and Same Origin
   # -     frame-src 'self' https://www.youtube.com (frame-src is deprecated)
   # -     worker-src 'self' www.youtube.com
   # -
   #Header always set Content-Security-Policy "default-src 'self' http: https: data: 'unsafe-inline' 'unsafe-eval' ; frame-ancestors 'self'; base-uri 'self'; form-action 'self';  object-src 'none'"

   # - A more secure configuration, including Google Analytics, Google AJAX CDN
   # - and Emmbedding Google Fonts
   # -
   #Header always set Content-Security-Policy "default-src 'none'; script-src 'self' 'unsafe-inline' www.google-analytics.com ajax.googleapis.com ; style-src 'self' 'unsafe-inline' fonts.googleapis.com; img-src 'self' ; connect-src 'self'; font-src 'self' data: https:; object-src 'self' ; media-src 'self' ; worker-src 'self' ; form-action 'self'; base-uri 'self'; frame-ancestors 'self'; upgrade-insecure-requests"

   # - Same as above but also allow YouTube Videos
   # -
   #Header always set Content-Security-Policy "default-src 'none'; script-src 'self' 'unsafe-inline' www.google-analytics.com ajax.googleapis.com ; style-src 'self' 'unsafe-inline' fonts.googleapis.com; img-src 'self' ; connect-src 'self'; font-src 'self' data: https:; object-src 'self' ; media-src 'self' ; worker-src 'self'' www.youtube.com ; form-action 'self'; base-uri 'self'; frame-ancestors 'self'; upgrade-insecure-requests"

   # - Referrer-Policy
   # -
   # - The HTTP referer (originally a misspelling of referrer[1]) is an HTTP header 
   # - field that identifies the address of the webpage (i.e. the URI or IRI) that 
   # - linked to the resource being requested. By checking the referrer, the new 
   # - webpage can see where the request originated.
   # -
   #Header set  Referrer-Policy "strict-origin-when-cross-origin"

   # - HTTP Strict Transport Security (HSTS)
   # -
   # - HSTS tells a browser that the website should only be accessed through
   # - a secure connection. The HSTS header will be remembered by a standard
   # compliant browser for max-age seconds.
   # -
   # - Remember this settings for 1 year
   # -
   #Header always set Strict-Transport-Security "max-age=15768000"