h5bp/server-configs-apache

X-Frame-Options don't mention anything about CSP

summercms opened this issue · 5 comments

Google and a few others have said they stopped using the X-Frame-Options header a while ago and that users should switch over to using CSP.

See here link (Google dropped support in Chrome 52): https://developers.google.com/web/updates/2016/06/chrome-52-deprecations#remove_support_for_x-frame-options_in_tags

It contains the following link: https://owasp.org/www-community/Clickjacking

Which I quote:

Sending the proper Content Security Policy (CSP) frame-ancestors directive response headers that instruct the browser to not allow framing from other domains. (This replaces the older X-Frame-Options HTTP headers.)

Link: https://www.w3.org/TR/CSP3/#directive-frame-ancestors

There is no mention of that in the X-Frame-Options section! File location here: https://github.com/h5bp/server-configs-apache/blob/master/src/security/x-frame-options.conf


What I'm saying is, you say it in the csp section, but you should also mention it in the X-Frame-Options section as well.

See here what response I got regarding it securityheaders/securityheaders-bugs#54

Thanks for opening this issue @ayumi-cloud.
Please use the search feature before opening a new issue, in our case you can find a review of X-Frame-Options in #154.
Closing as duplicate.

@LeoColomb See image:

image

There is no duplicate issue here!

I'm saying you give NO MENTION OF CSP IN YOUR DESCRIPTION HERE!

Please re-open this is a separate issue!

Well XFO is not CSP, so this is not that surprising...
Anyway, documentation is always improvable, don't hesitate to open a pull request with you suggestions.

Well XFO is not CSP, so this is not that surprising...

Strange as you wrote this:

superseded by for the CSP addition.

Comment link: #154 (comment)

I rather not submit a pull request for you. Instead we prefer just to hard fork this repo (due to poor management).