HTTP Headers Analyzer
5 / 10
https://geohoney.com/
WordPress → Apache → Browser9 missing headers, 1 warnings, 2 notices
Header
Value
Explanation
date
sat, 19 apr 2025 17:40:58 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against
Max-Age
or Expires
.server
apache/2.4.41 (ubuntu)
upgrade
h2
Used to promote alternative communication protocols through which the same resource can be retrieved.
h2
stands for HTTP/2 over TLS. The browser and server can decide to upgrade from HTTP/1.1 to HTTP/2 over TLS.connection
upgrade, close
Specifies whether the network connection stays open after the current request.
keep-alive
specifies that the browser would like to keep the connection open, while close
indicates that the browser wants to close the connection.cache-control
no-cache, private
private
means the response can only be stored by the browser's cache, but not by CDNs, proxies, or any other shared caches.no-cache
means the response can be stored by any cache, but the stored response must be validated with the origin server before each reuse. If the origin confirms that the response hasn't changed, downloading of the full response body can be skipped.Warning
no-cache
will cause a revalidation request to the origin server for every use of the cached response. Consider using public
with appropriate max-age
to improve caching efficiency.set-cookie
xsrf-token=eyjpdii6ikxfzeu5a2gvazjtrlrpmzm1whprdwc9psisinzhbhvlijoiztkvzgrxbhnudkpstwhnadlikytcs3dnrknnb0w4zvzis1bqz1j6se1mqljrdzjkukpcr3ruoenuevr2wuhhbepbyzvqyjloq0vdanfdv3rpt1lqmuq0shnkmzjrlzi0q29jsduvdxbtr2vhotrwtkvoamu4wnlnahjcynlqdc8ilcjtywmioijhn2u4zmi1zmvhzdc1n2iwzjniytmwywiwmwu1yjq0mzi0nda2nwuwzjg2ymfhzjbmntkzzta1m2q0ztzjzwziin0%3d; expires=sat, 19-apr-2025 19:40:59 gmt; max-age=7200; path=/; samesite=lax
A cookie that was sent from the server to the browser.
Notice
expires=
sets the maximum lifetime of the cookie using a specific date.max-age=
sets the maximum lifetime of the cookie in seconds.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.Notice
samesite=lax
instructs the browser not to share the cookie with third-party sites (e.g. when loading images, videos or frames from other sites), with one exception. The cookie will be sent when a user is navigating to the origin site from an external site (for example, when following a link). To improve protection against cross-site request forgery attacks, set to samesite=strict
.set-cookie
geohoney_session=eyjpdii6ijnkbtrezmtzvmntvetibxz3k3uxehc9psisinzhbhvlijoiss9rzhdtowniym4vzgtwu3fuexfvenriefbjvfg5qm53zuwvcwprrgv3mjhhzwexni9hcvvkqknpa1vfsw5tdjhomgv0yuo2u1jeazz4zxfqmfq0sjfxnmtak2p5dfq1u2v0r29inllynta4ymrnvda3ait1uurmm002utrla0kilcjtywmioijmywm0ogi1zwuwzgixmtg1mwnimgjmzjc1oty2n2u4mdazywvmmzbknmq1ztyyzmy2zdk3m2vjyjk0odvmyzayin0%3d; expires=sat, 19-apr-2025 19:40:59 gmt; max-age=7200; path=/; httponly; samesite=lax
A cookie that was sent from the server to the browser.
Notice
expires=
sets the maximum lifetime of the cookie using a specific date.max-age=
sets the maximum lifetime of the cookie in seconds.path=
indicates the path that must exist in the requested URL for the browser to send the cookie.Notice
samesite=lax
instructs the browser not to share the cookie with third-party sites (e.g. when loading images, videos or frames from other sites), with one exception. The cookie will be sent when a user is navigating to the origin site from an external site (for example, when following a link). To improve protection against cross-site request forgery attacks, set to samesite=strict
.httponly
forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.strict-transport-security
missing Add a
Strict-Transport-Security
header. The Strict-Transport-Security
header or HSTS header is used to instruct browsers to only use HTTPS, instead of using HTTP. It helps enforce secure communication.content-security-policy
missing Add a
Content-Security-Policy
header. The Content-Security-Policy
header helps browsers prevent cross site scripting (XSS) and data injection attacks.referrer-policy
missing Add a
Referrer-Policy
header. When a visitor navigates from one page to another, browsers often pass along referrer information. The Referrer-Policy
header controls how much referrer information a browser can share. This is important to configure when private information is embedded in the path or query string and passed onto an external destination.permissions-policy
missing Add a
Permissions-Policy
header. Restrict access to device features like the camera, microphone, location, accelerometer and much more.cross-origin-embedder-policy
missing Add a
Cross-Origin-Embedder-Policy
to specify how this page can be loaded by cross-origin resources.cross-origin-opener-policy
missing Add a
Cross-Origin-Opener-Policy
header to opt-in into better browser isolation.cross-origin-resource-policy
missing Add a
Cross-Origin-Resource-Policy
header to specify who can load this page.x-frame-options
missing Add a
X-Frame-Options
header. The X-Frame-Options
header prevents this URL from being embedded in an iframe
. This protects against clickjacking attacks. Alternatively, set a Content-Security-Policy
header with a frame-ancestor
directive.x-permitted-cross-domain-policies
missing Add a
X-Permitted-Cross-Domain-Policies
header to prevent Flash, Adobe Reader and other clients from sharing data across domains.Questions or feedback? Email dries@buytaert.net.