SEC-2269: Fix additional links

This commit is contained in:
Rob Winch 2013-08-20 14:02:33 -05:00
parent 3b2156969d
commit a3a432f7b6
2 changed files with 27 additions and 25 deletions

View File

@ -420,13 +420,13 @@
</section>
<section xml:id="nsa-xss-protection">
<title><literal>&lt;xss-protection&gt;</literal></title>
<para>Adds the <a href="http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx">X-XSS-Protection header</a>
to the response to assist in protecting against <a href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</a>
<para>Adds the <link xlink:href="http://blogs.msdn.com/b/ie/archive/2008/07/02/ie8-security-part-iv-the-xss-filter.aspx">X-XSS-Protection header</link>
to the response to assist in protecting against <link xlink:href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</link>
attacks. This is in no-way a full protection to XSS attacks!</para>
<section xml:id="nsa-xss-protection-attributes">
<section xml:id="nsa-xss-protection-enabled">
<title><literal>xss-protection-enabled</literal></title>
<para>Enable or Disable <a href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</a> protection.</para>
<para>Enable or Disable <link xlink:href="http://en.wikipedia.org/wiki/Cross-site_scripting#Non-Persistent">reflected / “Type-1” Cross-Site Scripting (XSS)</link> protection.</para>
</section>
<section xml:id="nsa-xss-protection-block">
<title><literal>xss-protection-block</literal></title>
@ -446,7 +446,7 @@
<section xml:id="nsa-content-type-options">
<title><literal>&lt;content-type-options&gt;</literal></title>
<para>Add the X-Content-Type-Options header with the value of nosniff to the response. This
<a href="http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx">disables MIME-sniffing</a>
<link xlink:href="http://blogs.msdn.com/b/ie/archive/2008/09/02/ie8-security-part-vi-beta-2-update.aspx">disables MIME-sniffing</link>
for IE8+ and Chrome extensions.</para>
<section xml:id="nsa-content-type-options-parents">
<title>Parent Elements of <literal>&lt;content-type-options&gt;</literal></title>

View File

@ -629,32 +629,34 @@ List&lt;OpenIDAttribute> attributes = token.getAttributes();</programlisting>The
<para>A lot of different attacks to hijack content, sessions or connections are available and lately
browsers (optionally) can help to prevent those attacks. To enable these features we need to send some
additional headers to the client. Spring Security allows for easy configuration for several headers.
<programlisting language="xml">
<![CDATA[
<headers/>
]]>
<programlisting language="xml"><![CDATA[
<http ...>
...
<headers/>
</http>]]>
</programlisting>
</para>
<para>Specifying the single headers element adds all the explicitly supported headers
with their default settings. If you only want select headers to be added,
you can add one or more of the child elements as shown below.
<programlisting language="xml">
<![CDATA[
<headers>
<!-- Add Cache-Control and Pragma headers -->
<cache-control/>
<!-- Add X-Content-Type-Options with value of nosniff -->
<content-type-options/>
<!-- Add custom headers -->
<header name="foo" value="bar"/>
<-- Adds HTTP Strict Transport Security (HSTS) for secure requests -->
<hsts/>
<!-- Add X-Frame-Options with a value of DENY -->
<frame-options/>
<!-- Adds X-XSS-Protection with value of 1; mode=block-->
<xss-protection/>
</headers>
]]>
<programlisting language="xml"><![CDATA[
<http ...>
...
<headers>
<!-- Add Cache-Control and Pragma headers -->
<cache-control/>
<!-- Add X-Content-Type-Options with value of nosniff -->
<content-type-options/>
<!-- Add custom headers -->
<header name="foo" value="bar"/>
<-- Adds HTTP Strict Transport Security (HSTS) for secure requests -->
<hsts/>
<!-- Add X-Frame-Options with a value of DENY -->
<frame-options/>
<!-- Adds X-XSS-Protection with value of 1; mode=block-->
<xss-protection/>
</headers>
</http>]]>
</programlisting>
</para>
<para>For additional information on how to customize the headers element refer to the <link xlink:href="#nsa-headers">headers</link>