Dries Buytaert

HTTP Headers Analyzer

10 / 10
https://metadrop.net/en
Drupal → Nginx → Browser
0 missing headers, 0 warnings, 1 notices
Header
Value
Explanation
server
nginx
date
thu, 03 apr 2025 19:53:14 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against Max-Age or Expires.
content-type
text/html; charset=utf-8
The type of the message body, specified as a MIME type.
vary
accept-encoding
The Vary header specifies a list of headers that must be considered when caching responses. For a cached response to be used, these headers must match between the cached response and the new request. This ensures that the appropriate version of a resource is served based on factors like language, encoding, or device type.
vary
cookie,accept-encoding
The Vary header specifies a list of headers that must be considered when caching responses. For a cached response to be used, these headers must match between the cached response and the new request. This ensures that the appropriate version of a resource is served based on factors like language, encoding, or device type.
cache-control
max-age=900, public
public means the response may be stored by all caches, including browser caches, CDNs, and shared caches.
max-age specifies the maximum amount of seconds a page is considered valid. The higher max-age, the longer a page can be cached.
x-drupal-dynamic-cache
uncacheable (poor cacheability)
content-language
en
Specifies the page's intended audience. For example, en-US means that the document is intended for English language speakers in the United States. The language tags are defined in RFC 5646.
x-content-type-options
nosniff
The X-Content-Type-Options header, when set to nosniff, prevents MIME type sniffing. This enhances security by ensuring browsers respect the declared Content-Type of the response, mitigating MIME confusion attacks.
The value nosniff is correctly set, providing protection against MIME type sniffing attacks.
x-frame-options
sameorigin
X-Frame-Options prevents this URL from being embedded in an iframe. This protects against clickjacking attacks.
sameorigin means that this page can be displayed in a iframe, but only on the currrent origin. It can't be displayed on another domain. Consider setting this to deny for added security.
x-generator
drupal 10 (https://www.drupal.org)
Some of the software used to generate or serve this page.
content-security-policy-report-only
script-src 'self' 'unsafe-inline' 'unsafe-eval' https://unpkg.com/ https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://d3js.org https://polyfill-fastly.io https://www.recaptcha.net; script-src-attr 'self' 'unsafe-inline'; script-src-elem 'self' 'unsafe-inline' http://stats.metadrop.pro/ https://www.googletagmanager.com/ https://unpkg.com/ https://www.recaptcha.net/ https://www.gstatic.com/ https://www.googleadservices.com/ https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://d3js.org https://polyfill-fastly.io https://www.recaptcha.net; style-src 'self' https://unpkg.com; style-src-attr 'self' 'unsafe-inline'; style-src-elem 'self' 'unsafe-inline' https://unpkg.com; frame-ancestors 'self'; report-uri https://metadrop.net/en/system/reporting/csp; report-to csp
Allows web developers to debug content security policies. Violations are reported to the specified report-uri, but not enforced.
content-security-policy
object-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://unpkg.com/ https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://d3js.org https://polyfill-fastly.io https://www.recaptcha.net; script-src-attr 'self' 'unsafe-inline'; script-src-elem 'self' 'unsafe-inline' http://stats.metadrop.pro/ https://www.googletagmanager.com/ https://unpkg.com/ https://www.recaptcha.net/ https://www.gstatic.com/ https://www.googleadservices.com/ https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://d3js.org https://polyfill-fastly.io https://www.recaptcha.net; style-src 'self' https://unpkg.com; style-src-attr 'self' 'unsafe-inline'; style-src-elem 'self' 'unsafe-inline' https://unpkg.com; frame-ancestors 'self'; report-uri https://metadrop.net/en/system/reporting/csp; report-to csp; upgrade-insecure-requests
The Content Security Policy (CSP) header helps prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by specifying which dynamic resources are allowed to load.
script-src specifies valid sources for JavaScript. This includes not only URLs loaded directly into <script> elements, but also things like inline script event handlers (onclick) and XSLT stylesheets which can trigger script execution.
object-src defines what <object>, <embed> and <applet> elements are allowed to be loaded and executed.
style-src defines what CSS stylesheets are allowed to be loaded.
frame-ancestors defines what parents may embed a page using <frame>, <iframe>, <object>, <embed> or <applet>.
report-to defines the URL that violations will be reported to. report-to is designed to replace report-uri, but still lacks universal browser support.
report-uri defines the URL that violations will be reported to. While report-uri is officially deprecated in favor of report-to, limited browser support for the latter means report-uri remains a viable option for now.
upgrade-insecure-requests instructs browsers to replace insecure URLs (HTTP) with secure URLs (HTTPS).
reporting-endpoints
csp="https://metadrop.net/en/system/reporting/csp", csp_reportonly="https://metadrop.net/en/system/reporting/csp_reportonly", default="https://metadrop.net/en/system/reporting/default"
cross-origin-embedder-policy
require-corp
Specifies if this page can embed cross-origin resources. Allowing an attacker to embed a page and load its context into their memory space could result in data leaks. This header shifts the default behavior to an explicit opt-in model; the actual policy is specified in either a seperate Cross-Origin-Resource-Policy header or a CORS check.
require-corp specifies that this page can only embedded resources from the same origin, or resources explicitly marked as loadable from another origin.
etag
"1743709994"
A unique identifier that changes every time a page at a given URL changes. It acts as a fingerprint. A cache can compare Etag values to see if the page has changed and became stale. For example, a browsers will send the ETag value of a cached page in an If-None-Match header. The web server compares the ETag value sent by the browser with the ETag value of the current version of the page. If both values are the same, the web server sends back a 304 Not Modified status and no body.
x-proxy-cache
miss
The page was not served from a cache.
strict-transport-security
max-age=31536000; includesubdomains
The Strict-Transport-Security header (HSTS) instructs browsers to only use HTTPS for future connections to this domain, enhancing security by preventing downgrade attacks and cookie hijacking.
max-age specifies the time, in seconds, that the browser should remember to use HTTPS only for this domain.
includesubdomains instructs the browser that all subdomains are HTTPS-only as well.
referrer-policy
strict-origin
When a visitor navigates from one page to another page, browsers often pass along referrer information. The Referrer-Policy header controls how much referrer information a browser can share. This is important because private information can be embedded in the path or query string.
strict-origin means that the protocol, host, and port are shared, but only when the protocol security level remains the same (HTTPS → HTTPS). The path and query string are not shared. When the protocol becomes less secure (HTTPS → HTTP), nothing is shared.
permissions-policy
accelerometer=(), camera=(), geolocation=(), microphone=()
Instructs a browser to selectively allow or deny certain browser APIs and features. It helps improve security.
cross-origin-opener-policy
same-origin-allow-popups
A Cross-Origin Opener Policy (COOP) header specifies how this page's browsing context can be shared when opened in a 'browser tab', 'popup', 'iframe', etc. The policy can force the creation of a new top-level browsing context to make sure the browser context is protected or isolated.
same-origin-allow-popups specifies that if a popup is created, and the popup comes from the same origin, then we have full access to that popup.
cross-origin-resource-policy
cross-origin
The Cross-Origin-Resource-Policy header is part of the Fetch metadata request headers. It controls how resources can be shared across origins, enhancing security by preventing unauthorized access to resources.
Notice cross-origin means the resource can be loaded by documents from any origin. This is the least secure option.
x-permitted-cross-domain-policies
none
Instructs clients like Flash and Acrobat Reader what cross-domain policy they have to use. none is the most secure setting. Data can't be shared across domains.

Questions or feedback? Email dries@buytaert.net.