-
Notifications
You must be signed in to change notification settings - Fork 3
/
readme.txt
104 lines (61 loc) · 2.85 KB
/
readme.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
=== Security Headers ===
Contributors: Simon Waters
Tags: TLS,HTTPS,HSTS,nosniff
Requires at least: 3.8.1
Tested up to: 4.9
Requires PHP: 5.6
Stable tag: trunk
License: GPLv2 or any later version
License URI: http://www.gnu.org/licenses/gpl-2.0.html
Plug-in to ease the setting of TLS headers for HSTS and similar
== Description ==
TLS is growing in complexity. Server Name Indication (SNI) now means HTTPS sites may be on shared IP addresses, or otherwise restricted. For these servers it is handy to be able to set desired HTTP headers without access to the web servers configuration or using .htaccess file.
This plug-in exposes controls for:
* HSTS (Strict-Transport-Security)
* HPKP (Public-Key-Pins)
* Disabling content sniffing (X-Content-Type-Options)
* XSS protection (X-XSS-Protection)
* Clickjacking mitigation (X-Frame-Options in main site)
* Expect-CT
HSTS is used to ensure that future connections to a website always use TLS, and disallowing bypass of certificate warnings for the site.
HPKP is used if you don't want to rely solely on the Certificate Authority trust model for certificate issuance.
Disabling content sniffing is mostly of interest for sites that allow users to upload files of specific types, but that browsers might be silly enough to interpret of some other type, thus allowing unexpected attacks.
XSS protection re-enables XSS protection for the site, if the user has disabled it previously, and sets the "block" option so that attacks are not silently ignored.
Clickjacking protection is usually only relevant when someone is logged in but users requested it, presumably they have rich content outside of WordPress authentication they wish to protect.
Expect-CT is used to ensure Certificate Transparency is configured correctly.
== Installation ==
1. Upload "security_headers.php" to the "/wp-content/plugins/" directory.
2. Activate the plugin through the "Plugins" menu in WordPress.
== Changelog ==
= 1.0 =
Add support for wp-login.php page
Add support for Expect-CT header
= 0.9 =
Removed unnecessary whitespace in HSTS header (thanks Thomas)
Added Referrer-Policy header
Corrected plugins name from "HTTP Headers" to "Security Header" (thanks Jamie)
Removed trailing semi-colon from X-XSS-Protection (it worked but not needed)
= 0.8 =
Add headers to admin section of WordPress
Added option to set the X-Frame-Options headers to main site
Added HSTS Preload header (thanks to Jamie)
= 0.7 =
Add report-uri
Fix handling of non-numeric blank strings for HPKP max-age
= 0.6 =
HPKP support
Check for TLS before emitting HSTS or HPKP headers
= 0.5 =
Change h2 for h1 for accessibility per #31650
= 0.4 =
License change
Clarify wording for XSS protection in readme
= 0.3 =
Prepare for release
= 0.2 =
Added Sonarqube file and formatting changes
= 0.1 =
* Initial release.
== Upgrade Notice ==
= 1.0 =
* Added support for wp-login.php