security.conf 1.8 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859
  1. # Changing the following options will not really affect the security of the
  2. # server, but might make attacks slightly more difficult in some cases.
  3. #
  4. # ServerTokens
  5. # This directive configures what you return as the Server HTTP response
  6. # Header. The default is 'Full' which sends information about the OS-Type
  7. # and compiled in modules.
  8. # Set to one of: Full | OS | Minimal | Minor | Major | Prod
  9. # where Full conveys the most information, and Prod the least.
  10. #ServerTokens Minimal
  11. ServerTokens OS
  12. #ServerTokens Full
  13. #
  14. # Optionally add a line containing the server version and virtual host
  15. # name to server-generated pages (internal error documents, FTP directory
  16. # listings, mod_status and mod_info output etc., but not CGI generated
  17. # documents or custom error documents).
  18. # Set to "EMail" to also include a mailto: link to the ServerAdmin.
  19. # Set to one of: On | Off | EMail
  20. #ServerSignature Off
  21. ServerSignature On
  22. #
  23. # Allow TRACE method
  24. #
  25. # Set to "extended" to also reflect the request body (only for testing and
  26. # diagnostic purposes).
  27. #
  28. # Set to one of: On | Off | extended
  29. TraceEnable Off
  30. #TraceEnable On
  31. #
  32. # Forbid access to version control directories
  33. #
  34. # If you use version control systems in your document root, you should
  35. # probably deny access to their directories.
  36. #
  37. # Examples:
  38. #
  39. #RedirectMatch 404 /\.git
  40. #RedirectMatch 404 /\.svn
  41. #
  42. # Setting this header will prevent MSIE from interpreting files as something
  43. # else than declared by the content type in the HTTP headers.
  44. # Requires mod_headers to be enabled.
  45. #
  46. #Header set X-Content-Type-Options: "nosniff"
  47. #
  48. # Setting this header will prevent other sites from embedding pages from this
  49. # site as frames. This defends against clickjacking attacks.
  50. # Requires mod_headers to be enabled.
  51. #
  52. #Header set Content-Security-Policy "frame-ancestors 'self';"