Skip to content

Releases: GetPageSpeed/ngx_security_headers

v0.2.0: Cross-Origin Security Headers

03 Feb 10:58

Choose a tag to compare

What's New

This release adds support for three Cross-Origin HTTP security headers as requested in #17:

New Directives

Directive Values Default
security_headers_corp same-site, same-origin, cross-origin, omit same-site
security_headers_coop same-origin, same-origin-allow-popups, unsafe-none, omit omit
security_headers_coep require-corp, credentialless, unsafe-none, omit omit

Design Decisions

  • CORP defaults to same-site - Safe opt-out default that only affects how YOUR resources are embedded elsewhere
  • COOP/COEP default to omit - Opt-in because they can break popup communication and third-party resources
  • COEP includes credentialless - Provides a middle ground for cross-origin isolation

Cross-Origin Isolation

To enable full cross-origin isolation (required for SharedArrayBuffer):

security_headers on;
security_headers_corp same-origin;
security_headers_coop same-origin;
security_headers_coep require-corp;

⚠️ Warning: Full isolation will break loading any cross-origin resources without proper CORS headers.

References

Fixes #17

v0.1.2

26 Apr 11:51
1a257f8

Choose a tag to compare

What's Changed

  • More headers to hide, more tests, if replaced by switch by @novashdima in #23

New Contributors

Full Changelog: 0.1.1...0.1.2

v0.1.1

09 Nov 09:05
390dc7c

Choose a tag to compare

Fixed issue with scheme extraction (#22), thanks to @kosmas-valianos for the contribution.

v0.1.0

05 Sep 17:47

Choose a tag to compare

Fixed

  • HSTS set to 1 year instead of 2 years by default (#18)
  • New default X-XSS-Protection: 0, see #19

v0.0.11

18 Mar 07:38

Choose a tag to compare

Fixed

  • Sending HSTS header no longer requires building with OpenSSL #12
  • Fixes HSTS preload was not added by default #15

v0.0.10

13 Mar 18:04

Choose a tag to compare

  • Ability to opt-out of added preload addition for HSTS, using security_headers_hsts_preload off;.
  • Remove X-Application-Version header
  • For adding HSTS, check URL protocol instead of connection protocol to be 'https://' #12

v0.0.9

29 Feb 00:22

Choose a tag to compare

  • Hide more server tokens
  • Optimization (e.g. don't send X-Frame-Options for non-HTML)

v0.0.8

05 Dec 20:03

Choose a tag to compare

Added security_headers_referrer_policy directive

v0.0.7

01 Sep 18:53

Choose a tag to compare

  • Reliable header replacement
  • Added HSTS

v0.0.4

23 Aug 23:01

Choose a tag to compare

Overwrites existing security headers, instead of duplicating them