Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for X-Permitted-Cross-Domain-Policies #88

Closed
reedloden opened this issue Apr 28, 2014 · 7 comments
Closed

Add support for X-Permitted-Cross-Domain-Policies #88

reedloden opened this issue Apr 28, 2014 · 7 comments

Comments

@reedloden
Copy link
Contributor

HTTP header used for informing Adobe products as to how to handle cross domain policies.

https://www.adobe.com/devnet-docs/acrobatetk/tools/AppSec/xdomain.html

https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html

Specifies the meta-policy. The default value is master-only for all policy files except socket policy files, where the default is all. Allowed values are:

  • none: No policy files are allowed anywhere on the target server, including this master policy file.
  • master-only: Only this master policy file is allowed.
  • by-content-type: [HTTP/HTTPS only] Only policy files served with Content-Type: text/x-cross-domain-policy are allowed.
  • by-ftp-filename: [FTP only] Only policy files whose file names are crossdomain.xml (i.e. URLs ending in /crossdomain.xml) are allowed.
  • all: All policy files on this target domain are allowed.
@oreoshake
Copy link
Contributor

Should the default be 'none'?

@stve
Copy link
Contributor

stve commented Apr 28, 2014

It seems like 'none' would be the most secure. All others would assume the existence of a crossdomain.xml file which is probably outside the scope of this project.

@oreoshake
Copy link
Contributor

Makes sense to me. Hmmm this could potentially break a lot of sites who wouldn't override the setting and needs it to function.

secure_headers 2.0 I guess.

@stve
Copy link
Contributor

stve commented Apr 29, 2014

I would think that since you aren't changing the external API (code-wise, at least) a major version release wouldn't be necessary. Maybe the default should be nil? That way the header is only included when a value is assigned.

@reedloden
Copy link
Contributor Author

For now, I think the best option is to not set this header by default but allow a user to set a specific value as needed.

@stve
Copy link
Contributor

stve commented Nov 14, 2014

I see that a pre-release of 2.0 was just tagged, given the major version bump, is there interest in having this included as part of 2.0? If so, I'd be happy to put some effort towards it.

@oreoshake
Copy link
Contributor

Yes please!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants