亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

directory search
Guides Access control CORS Authentication Browser detection using the user agent Caching Caching FAQ Compression Conditional requests Connection management in HTTP 1.x Content negotiation Content negotiation: List of default Accept values Cookies CSP Messages Overview Protocol upgrade mechanism Proxy servers and tunneling Proxy servers and tunneling: Proxy Auto-Configuration (PAC) file Public Key Pinning Range requests Redirections Resources and specifications Resources and URIs Response codes Server-Side Access Control Session Guides: Basics Basics of HTTP Choosing between www and non-www URLs Data URIs Evolution of HTTP Identifying resources on the Web MIME Types MIME types: Complete list of MIME types CSP Content-Security-Policy Content-Security-Policy-Report-Only CSP: base-uri CSP: block-all-mixed-content CSP: child-src CSP: connect-src CSP: default-src CSP: font-src CSP: form-action CSP: frame-ancestors CSP: frame-src CSP: img-src CSP: manifest-src CSP: media-src CSP: object-src CSP: plugin-types CSP: referrer CSP: report-uri CSP: require-sri-for CSP: sandbox CSP: script-src CSP: style-src CSP: upgrade-insecure-requests CSP: worker-src Headers Accept Accept-Charset Accept-Encoding Accept-Language Accept-Ranges Access-Control-Allow-Credentials Access-Control-Allow-Headers Access-Control-Allow-Methods Access-Control-Allow-Origin Access-Control-Expose-Headers Access-Control-Max-Age Access-Control-Request-Headers Access-Control-Request-Method Age Allow Authorization Cache-Control Connection Content-Disposition Content-Encoding Content-Language Content-Length Content-Location Content-Range Content-Type Cookie Cookie2 Date DNT ETag Expect Expires Forwarded From Headers Host If-Match If-Modified-Since If-None-Match If-Range If-Unmodified-Since Keep-Alive Large-Allocation Last-Modified Location Origin Pragma Proxy-Authenticate Proxy-Authorization Public-Key-Pins Public-Key-Pins-Report-Only Range Referer Referrer-Policy Retry-After Server Set-Cookie Set-Cookie2 SourceMap Strict-Transport-Security TE Tk Trailer Transfer-Encoding Upgrade-Insecure-Requests User-Agent User-Agent: Firefox Vary Via Warning WWW-Authenticate X-Content-Type-Options X-DNS-Prefetch-Control X-Forwarded-For X-Forwarded-Host X-Forwarded-Proto X-Frame-Options X-XSS-Protection Methods CONNECT DELETE GET HEAD Methods OPTIONS PATCH POST PUT Status 100 Continue 101 Switching Protocols 200 OK 201 Created 202 Accepted 203 Non-Authoritative Information 204 No Content 205 Reset Content 206 Partial Content 300 Multiple Choices 301 Moved Permanently 302 Found 303 See Other 304 Not Modified 307 Temporary Redirect 308 Permanent Redirect 400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 405 Method Not Allowed 406 Not Acceptable 407 Proxy Authentication Required 408 Request Timeout 409 Conflict 410 Gone 411 Length Required 412 Precondition Failed 413 Payload Too Large 414 URI Too Long 415 Unsupported Media Type 416 Range Not Satisfiable 417 Expectation Failed 426 Upgrade Required 428 Precondition Required 429 Too Many Requests 431 Request Header Fields Too Large 451 Unavailable For Legal Reasons 500 Internal Server Error 501 Not Implemented 502 Bad Gateway 503 Service Unavailable 504 Gateway Timeout 505 HTTP Version Not Supported 511 Network Authentication Required Status
characters

HTTP Content-Security-Policy(CSP)upgrade-insecure-requests指令指示用戶代理將所有站點的不安全URL(通過HTTP提供的URL)視為已被替換為安全URL(通過HTTPS提供的URL)。此指令適用于需要重寫大量不安全的舊版URL的網(wǎng)站。

upgrade-insecure-requests指令在之前被評估block-all-mixed-content,如果被設(shè)置,后者實際上是沒有操作的。建議設(shè)置一個指令或另一個指令,但不能同時設(shè)置。

upgrade-insecure-requests指令不會確保通過第三方網(wǎng)站上的鏈接訪問您的網(wǎng)站的用戶將升級到頂級導(dǎo)航的HTTPS,因此不會替代Strict-Transport-Security(HSTS)標(biāo)頭,該標(biāo)頭仍應(yīng)設(shè)置適當(dāng)?shù)臉?biāo)頭max-age以確保用戶不會受到SSL剝離攻擊。

句法

Content-Security-Policy: upgrade-insecure-requests;

示例

// headerContent-Security-Policy: upgrade-insecure-requests;// meta tag<meta http-equiv="Content-Security-Policy" content="upgrade-insecure-requests">

通過將上述標(biāo)頭設(shè)置在域example.com上并希望從HTTP遷移到HTTPS,非導(dǎo)航不安全資源請求會自動升級(第一方以及第三方請求)。

<img src="http://example.com/image.png"><img src="http://not-example.com/image.png">

這些 URL 將在請求發(fā)生之前被重寫,這意味著沒有不安全的請求會觸及網(wǎng)絡(luò)。請注意,如果請求的資源通過 HTTPS 實際上不可用,則該請求將失敗,而不會返回到 HTTP。

<img src="https://example.com/image.png"><img src="https://not-example.com/image.png">

導(dǎo)航升級到第三方資源會帶來更高的破損潛力,但這些升級并不會升級:

<a href="https://example.com/">Home</a><a href="http://not-example.com/">Home</a>

發(fā)現(xiàn)不安全的請求

借助Content-Security-Policy-Report-Only標(biāo)題和report-uri指令,您可以設(shè)置強制策略和報告策略,如下所示:

Content-Security-Policy: upgrade-insecure-requests; default-src https: Content-Security-Policy-Report-Only: default-src https:; report-uri /endpoint

這樣,您仍會在安全網(wǎng)站上升級不安全的請求,但唯一的監(jiān)控策略被違反并向您的端點報告不安全的資源。

規(guī)范

規(guī)范

狀態(tài)

評論

升級不安全的請求在該規(guī)范中定義了“ upgrade-insecure-requests ”。

候選推薦

初始定義。

瀏覽器兼容性

特征

Chrome

Firefox

Edge

Internet Explorer

Opera

Safari

基本支持

43

42.0

(No)1

(No)

30

(No)

特征

Android

Chrome for Android

Edge mobile

Firefox for Android

IE mobile

Opera Android

iOS Safari

基本支持

?

43

(No)

42.0

(No)

?

(No)

Previous article: Next article: