Skip to content

[CSP] specify handling of malformed content-security-policy HTTP header #6

@mikewest

Description

@mikewest

From @shekyan on October 2, 2015 23:31

Section 3.1 should be explicit how user-agent should behave in the context of malformed content-security-policy header.
For example, unknown directive, non-ASCII characters, multiple 'none' keywords in source-expression do not match the 'policy-token' grammar.

We suggest treating these headers as either default-src 'none' or default-src 'self'

Copied from original issue: w3c/webappsec#495

Metadata

Metadata

Assignees

No one assigned

    Labels

    clarificationThe standard is unclear or ambiguousinteropImplementations are not interoperable with each other

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions