Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hpkp support (take 2) #143

Merged
merged 5 commits into from
May 7, 2015
Merged

Hpkp support (take 2) #143

merged 5 commits into from
May 7, 2015

Conversation

oreoshake
Copy link
Contributor

This is a continuation of #132 from @thirstscolr

@thirstscolr
Copy link
Contributor

👍 thanks for fixing up the syntax!

oreoshake added a commit that referenced this pull request May 7, 2015
@oreoshake oreoshake merged commit 452c13d into master May 7, 2015
@oreoshake oreoshake deleted the hpkp branch May 7, 2015 18:30
@@ -8,6 +8,7 @@ The gem will automatically apply several headers that are related to security.
- X-Content-Type-Options - [Prevent content type sniffing](http://msdn.microsoft.com/en-us/library/ie/gg622941\(v=vs.85\).aspx)
- X-Download-Options - [Prevent file downloads opening](http://msdn.microsoft.com/en-us/library/ie/jj542450(v=vs.85).aspx)
- X-Permitted-Cross-Domain-Policies - [Restrict Adobe Flash Player's access to data](https://www.adobe.com/devnet/adobe-media-server/articles/cross-domain-xml-for-streaming.html)
- Public Key Pinning - Pin certificate fingerprints in the browser to prevent man-in-the-middle attacks due to compromised Certificate Authorites. [Public Key Pinnning Specification](https://tools.ietf.org/html/draft-ietf-websec-key-pinning-21)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants