HTTP Headers Analyzer
4 / 10
https://drsetup12.easy.co/products/as2
Website → Varnish → Browser8 missing headers, 2 warnings, 3 notices
Header
Value
Explanation
x-content-type-options
nosniff
The
The value
X-Content-Type-Options
header, when set to nosniff
, prevents MIME type sniffing. This enhances security by ensuring browsers respect the declared Content-Type of the response, mitigating MIME confusion attacks.The value
nosniff
is correctly set, providing protection against MIME type sniffing attacks.via
1.1 varnish, 1.1 varnish, 1.1 varnish
The
Via
header tracks how a page is forwarded from proxy to proxy. Beware, not all proxies append themselves to the Via
header.x-powered-by
express
Some of the software used to generate or serve this page.
accept-ranges
bytes
Used by the server to advertise its support of partial HTTP requests. The browser can ask for a range or subset of the response body. It's a feature that allows a browser to resume an interrupted download.
bytes
is the only range unit currently supported. none
means that the server does not support range requests.set-cookie
locale=en_us; expires=fri, 14-feb-2025 07:08:31 gmt; max-age=2592000; path=/
A cookie that was sent from the server to the browser.
expires=
sets the maximum lifetime of the cookie using a specific date.max-age=
sets the maximum lifetime of the cookie in seconds.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.set-cookie
xsrf-token=ee6l7snt88y8yvzhxys4nvluszgxarygidfvcfur; expires=fri, 17-jan-2025 07:08:32 gmt; max-age=172800; path=/; domain=drsetup12.easy.co; secure
A cookie that was sent from the server to the browser.
expires=
sets the maximum lifetime of the cookie using a specific date.max-age=
sets the maximum lifetime of the cookie in seconds.domain=
sets the domain to which the cookie will be sent.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.secure
instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.set-cookie
_easystore_z=dg2iqmk4oiamvmkbkfny0rvao9y9ioiu67xuhjw5; path=/; domain=drsetup12.easy.co; secure; httponly
A cookie that was sent from the server to the browser.
domain=
sets the domain to which the cookie will be sent.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.secure
instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly
forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.set-cookie
_landing_page=%252fproducts%252fas2; expires=wed, 29-jan-2025 07:08:32 gmt; max-age=1209600; path=/; domain=drsetup12.easy.co; secure; httponly
A cookie that was sent from the server to the browser.
expires=
sets the maximum lifetime of the cookie using a specific date.max-age=
sets the maximum lifetime of the cookie in seconds.domain=
sets the domain to which the cookie will be sent.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.secure
instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly
forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.cache-control
no-cache, no-store, private
private
means the response can only be stored by the browser's cache, but not by CDNs, proxies, or any other shared caches.no-cache
means the response can be stored by any cache, but the stored response must be validated with the origin server before each reuse. If the origin confirms that the response hasn't changed, downloading of the full response body can be skipped.Warning
no-cache
will cause a revalidation request to the origin server for every use of the cached response. Consider using public
with appropriate max-age
to improve caching efficiency.Warning
no-store
means the response may not be stored in any cache, including the browser's cache.Notice
no-store
is set, so it does not make sense to set no-cache
as well.Notice
no-store
is set, so it does not make sense to set private
as well.x-xss-protection
1; mode=block
This header enables the browser's built-in XSS protection. However, it's considered legacy and modern browsers may ignore it.
Notice While this header provides some protection, it's recommended to use
1
enables the browser's cross-site scripting (XSS) filtering.mode=block
instructs the browser to block the response if a XSS attack is detected, instead of sanitizing the page.Notice While this header provides some protection, it's recommended to use
Content-Security-Policy
instead, as it offers more comprehensive and flexible protection against XSS and other injection attacks.date
wed, 15 jan 2025 07:08:32 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against
Max-Age
or Expires
.x-served-by
cache-qpg1267-qpg, cache-qpg120098-qpg, cache-iad-kiad7000154-iad
Fastly's shield and edge servers that were queried for the request.
x-cache
miss, miss, miss
The page was not served from a cache.
x-cache-hits
0, 0, 0
The number of times this page has been served from the Varnish cache. Higher numbers are better.
x-timer
s1736924912.776704,vs0,ve600
Provides timing information about the journey of a request through Fastly's network. Format:
s<timestamp>,vs<seconds>,ve<seconds>
, where s
is the start time of the request, ve
stands for Varnish start and ve
stands for Varnish end. The length of the trip is ve - vs
milliseconds.vary
accept-encoding
The
Vary
header specifies a list of headers that must be considered when caching responses. For a cached response to be used, these headers must match between the cached response and the new request. This ensures that the appropriate version of a resource is served based on factors like language, encoding, or device type.strict-transport-security
max-age=31557600
The
Strict-Transport-Security
header (HSTS) instructs browsers to only use HTTPS for future connections to this domain, enhancing security by preventing downgrade attacks and cookie hijacking.max-age
specifies the time, in seconds, that the browser should remember to use HTTPS only for this domain.content-security-policy
missing Add a
Content-Security-Policy
header. The Content-Security-Policy
header helps browsers prevent cross site scripting (XSS) and data injection attacks.referrer-policy
missing Add a
Referrer-Policy
header. When a visitor navigates from one page to another, browsers often pass along referrer information. The Referrer-Policy
header controls how much referrer information a browser can share. This is important to configure when private information is embedded in the path or query string and passed onto an external destination.permissions-policy
missing Add a
Permissions-Policy
header. Restrict access to device features like the camera, microphone, location, accelerometer and much more.cross-origin-embedder-policy
missing Add a
Cross-Origin-Embedder-Policy
to specify how this page can be loaded by cross-origin resources.cross-origin-opener-policy
missing Add a
Cross-Origin-Opener-Policy
header to opt-in into better browser isolation.cross-origin-resource-policy
missing Add a
Cross-Origin-Resource-Policy
header to specify who can load this page.x-frame-options
missing Add a
X-Frame-Options
header. The X-Frame-Options
header prevents this URL from being embedded in an iframe
. This protects against clickjacking attacks. Alternatively, set a Content-Security-Policy
header with a frame-ancestor
directive.x-permitted-cross-domain-policies
missing Add a
X-Permitted-Cross-Domain-Policies
header to prevent Flash, Adobe Reader and other clients from sharing data across domains.Questions or feedback? Email dries@buytaert.net.