亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

directory search
Guides Access control CORS Authentication Browser detection using the user agent Caching Caching FAQ Compression Conditional requests Connection management in HTTP 1.x Content negotiation Content negotiation: List of default Accept values Cookies CSP Messages Overview Protocol upgrade mechanism Proxy servers and tunneling Proxy servers and tunneling: Proxy Auto-Configuration (PAC) file Public Key Pinning Range requests Redirections Resources and specifications Resources and URIs Response codes Server-Side Access Control Session Guides: Basics Basics of HTTP Choosing between www and non-www URLs Data URIs Evolution of HTTP Identifying resources on the Web MIME Types MIME types: Complete list of MIME types CSP Content-Security-Policy Content-Security-Policy-Report-Only CSP: base-uri CSP: block-all-mixed-content CSP: child-src CSP: connect-src CSP: default-src CSP: font-src CSP: form-action CSP: frame-ancestors CSP: frame-src CSP: img-src CSP: manifest-src CSP: media-src CSP: object-src CSP: plugin-types CSP: referrer CSP: report-uri CSP: require-sri-for CSP: sandbox CSP: script-src CSP: style-src CSP: upgrade-insecure-requests CSP: worker-src Headers Accept Accept-Charset Accept-Encoding Accept-Language Accept-Ranges Access-Control-Allow-Credentials Access-Control-Allow-Headers Access-Control-Allow-Methods Access-Control-Allow-Origin Access-Control-Expose-Headers Access-Control-Max-Age Access-Control-Request-Headers Access-Control-Request-Method Age Allow Authorization Cache-Control Connection Content-Disposition Content-Encoding Content-Language Content-Length Content-Location Content-Range Content-Type Cookie Cookie2 Date DNT ETag Expect Expires Forwarded From Headers Host If-Match If-Modified-Since If-None-Match If-Range If-Unmodified-Since Keep-Alive Large-Allocation Last-Modified Location Origin Pragma Proxy-Authenticate Proxy-Authorization Public-Key-Pins Public-Key-Pins-Report-Only Range Referer Referrer-Policy Retry-After Server Set-Cookie Set-Cookie2 SourceMap Strict-Transport-Security TE Tk Trailer Transfer-Encoding Upgrade-Insecure-Requests User-Agent User-Agent: Firefox Vary Via Warning WWW-Authenticate X-Content-Type-Options X-DNS-Prefetch-Control X-Forwarded-For X-Forwarded-Host X-Forwarded-Proto X-Frame-Options X-XSS-Protection Methods CONNECT DELETE GET HEAD Methods OPTIONS PATCH POST PUT Status 100 Continue 101 Switching Protocols 200 OK 201 Created 202 Accepted 203 Non-Authoritative Information 204 No Content 205 Reset Content 206 Partial Content 300 Multiple Choices 301 Moved Permanently 302 Found 303 See Other 304 Not Modified 307 Temporary Redirect 308 Permanent Redirect 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 408 Request Timeout 409 Conflict 410 Gone 411 Length Required 412 Precondition Failed 413 Payload Too Large 414 URI Too Long 415 Unsupported Media Type 416 Range Not Satisfiable 417 Expectation Failed 426 Upgrade Required 428 Precondition Required 429 Too Many Requests 431 Request Header Fields Too Large 451 Unavailable For Legal Reasons 500 Internal Server Error 501 Not Implemented 502 Bad Gateway 503 Service Unavailable 504 Gateway Timeout 505 HTTP Version Not Supported 511 Network Authentication Required Status
characters

HTTP Content-Security-Policy-Report-Only響應(yīng)頭允許Web開發(fā)人員通過監(jiān)視(但不強(qiáng)制執(zhí)行)其效果來實(shí)驗(yàn)策略。這些違規(guī)報(bào)告由通過HTTP 請求發(fā)送到指定URI 的JSON文檔組成POST。

有關(guān)更多信息,另請參閱本文有關(guān)內(nèi)容安全策略(CSP)的文章。

標(biāo)題類型

響應(yīng)標(biāo)題

禁止標(biāo)題名稱

沒有

| This header is not supported inside a <meta> element. |

句法

Content-Security-Policy-Report-Only: <policy-directive>; <policy-directive>

指令

Content-Security-Policy標(biāo)題的指令也可以應(yīng)用于Content-Security-Policy-Report-Only。

CSP report-uri指令應(yīng)該與這個標(biāo)題一起使用,否則這個標(biāo)題將是一個昂貴的不操作機(jī)器。

示例

標(biāo)題報(bào)告可能發(fā)生的違規(guī)行為。您可以使用它來反復(fù)處理您的內(nèi)容安全策略。您可以觀察您的網(wǎng)站的行為,監(jiān)視違規(guī)報(bào)告,然后選擇Content-Security-Policy標(biāo)題實(shí)施的所需策略。

Content-Security-Policy-Report-Only: default-src https:; report-uri /csp-violation-report-endpoint/

如果您仍然希望接收報(bào)告,但也希望強(qiáng)制執(zhí)行策略,請?jiān)?code>report-uri指令中使用Content-Security-Policy標(biāo)題。

Content-Security-Policy: default-src https:; report-uri /csp-violation-report-endpoint/

違規(guī)報(bào)告語法

報(bào)告JSON對象包含以下數(shù)據(jù):

document-uri發(fā)生違規(guī)的文檔的URI。

referrer違規(guī)發(fā)生的文件的推薦人。

blocked-uri內(nèi)容安全策略阻止加載的資源的URI。如果阻止的URI來自與document-uri不同的來源,則阻止的URI將被截?cái)嘁詢H包含方案,主機(jī)和端口。

violated-directive違反政策部分的名稱。

original-policyContent-Security-PolicyHTTP header.disposition 指定的原始策略根據(jù)是否使用Content-Security-Policy標(biāo)題或Content-Security-Header-Report-Only標(biāo)題而“enforce”或“reporting” 。

示例違規(guī)報(bào)告

讓我們考慮一個位于http://example.com/signup.html的頁面。它使用以下策略,禁止除了樣式表之外的所有內(nèi)容cdn.example.com

Content-Security-Policy-Report-Only: default-src 'none'; style-src cdn.example.com; report-uri /_/csp-reports

HTML的signup.html外觀如下所示:

<!DOCTYPE html><html>  <head>    <title>Sign Up</title>    <link rel="stylesheet" href="css/style.css">  </head>  <body>    ... Content ...  </body></html>

你能發(fā)現(xiàn)違規(guī)行為嗎?樣式表只允許加載cdn.example.com,但網(wǎng)站嘗試從它自己的原點(diǎn)加載一個(http://example.com)。能夠執(zhí)行CSP的瀏覽器將下列違規(guī)報(bào)告作為POST請求發(fā)送至http://example.com/_/csp-reports訪問文檔時:

{  "csp-report": {    "document-uri": "http://example.com/signup.html",    "referrer": "",    "blocked-uri": "http://example.com/css/style.css",    "violated-directive": "style-src cdn.example.com",    "original-policy": "default-src 'none'; style-src cdn.example.com; report-uri /_/csp-reports",    "disposition": "report"  }}

正如您所看到的,報(bào)告包含違規(guī)資源的完整路徑blocked-uri。這并非總是如此。例如,當(dāng)signup.html試圖從中加載CSS時http://anothercdn.example.com/stylesheet.css,瀏覽器將包含完整路徑,而只包含origin(http://anothercdn.example.com)。這是為了防止泄露有關(guān)跨源資源的敏感信息。

產(chǎn)品規(guī)格

規(guī)范

狀態(tài)

評論

內(nèi)容安全策略3級

編輯草稿

沒有變化。

內(nèi)容安全策略2級

建議

初始定義。

瀏覽器兼容性

Feature

Chrome

Firefox

Edge

Internet Explorer

Opera

Safari

Basic Support

25

23.0

14

10

15

7

Feature

Android

Chrome for Android

Edge mobile

Firefox for Android

IE mobile

Opera Android

iOS Safari

Basic Support

4.4

(Yes)

(Yes)

23.0

?

?

7.1

另請參閱

  • Content-Security-Policy

  • CSP report-uri directive

  • Content Security in WebExtensions

  • Display security and privacy policies In Firefox Developer Tools

  • https://report-uri.io – CSP and HPKP reporting

  • Hosted CSP reporting for HTTPS migrations

Previous article: Next article: