Drafted by: Gonçalo Valério. Fediverse / Github
$ telnet meetup.com 80
GET /Madeira-Tech/events/267474832/ HTTP/1.1
Host: www.meetup.com
Cache-Control: no-cache
$ openssl s_client -connect meetup.com:443
GET /Madeira-Tech/events/267474832/ HTTP/1.1
Host: www.meetup.com
Cache-Control: no-cache
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
x-frame-options: SAMEORIGIN
accept-ranges: bytes
Set-Cookie: BID="id=bd09c108..."; path=/; domain=.meetup.com
Content-Length: 314616
...
{response_html}
“The frame-ancestors directive obsoletes the X-Frame-Options header. If a resource has both policies, the frame-ancestors policy SHOULD be enforced and the X-Frame-Options policy SHOULD be ignored.”
Only supported by: Internet Explorer, Chrome and Safari.But is on its way out.
https://hstspreload.org/
Content-Security-Policy: base-uri 'self';connect-src *;
default-src 'self' *.meetup.com *.dev.meetup.com:8001;
font-src * data:;frame-ancestors 'self';frame-src *;
img-src * data: blob:;
script-src * 'unsafe-eval' 'unsafe-inline';
style-src * 'unsafe-inline'
Content-Security-Policy: default-src 'self';
style-src 'self' 'unsafe-inline';
img-src 'self' data:; connect-src 'self';
object-src 'none'; base-uri 'none';
{
"csp-report": {
"document-uri": "http://example.com/signup.html",
"referrer": "",
"blocked-uri": "http://example.com/css/style.css",
"violated-directive": "style-src cdn.example.com",
"original-policy": "default-src 'none'; style-src cdn.example.com; report-uri /_/csp-reports"
}
}
There are other intermediary options.
Useful links