HTTP Headers Analyzer
6 / 10
https://support.iubenda.com/support/discussions/topics/42000308278
Website → CloudFlare → Browser8 missing headers, 1 warnings, 1 notices
Header
Value
Explanation
date
tue, 24 feb 2026 19:27:13 gmt
The date and time at which the request was made. A browser uses it for age calculations rather than using its own internal date and time; e.g. when comparing against
Max-Age or Expires.cf-ray
9d315bef0c4a0581-iad
The
cf-ray header provides a unique identifier for each request through Cloudflare. It's useful for troubleshooting and tracking requests in Cloudflare logs.status
200 ok
x-ratelimit-limit
300
x-ratelimit-reset
240226192813
strict-transport-security
max-age=31536000; includesubdomains; preload
The
Strict-Transport-Security header (HSTS) instructs browsers to only use HTTPS for future connections to this domain, enhancing security by preventing downgrade attacks and cookie hijacking.max-age specifies the time, in seconds, that the browser should remember to use HTTPS only for this domain.includesubdomains instructs the browser that all subdomains are HTTPS-only as well.preload recommends the domain for inclusion in browsers' preload lists. If accepted, the domain would get hardcoded into browsers as HTTPS-only.x-ratelimit-remaining
299
x-ratelimit-remaining
499
x-xss-protection
1; mode=block
This header enables the browser's built-in XSS protection. However, it's considered legacy and modern browsers may ignore it.
Notice While this header provides some protection, it's recommended to use
1 enables the browser's cross-site scripting (XSS) filtering.mode=block instructs the browser to block the response if a XSS attack is detected, instead of sanitizing the page.Notice While this header provides some protection, it's recommended to use
Content-Security-Policy instead, as it offers more comprehensive and flexible protection against XSS and other injection attacks.x-request-id
b36b0734-3b8f-9870-b903-d802d0e7d22b
A unique identifier for the HTTP request. This can be useful for tracking a request through complex systems or for debugging purposes.
x-content-type-options
nosniff
The
The value
X-Content-Type-Options header, when set to nosniff, prevents MIME type sniffing. This enhances security by ensuring browsers respect the declared Content-Type of the response, mitigating MIME confusion attacks.The value
nosniff is correctly set, providing protection against MIME type sniffing attacks.set-cookie
_x_w=29_1; path=/; httponly; secure
A cookie that was sent from the server to the browser.
path= indicates the path that must exist in the requested URL for the browser to send the cookie.secure instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.set-cookie
_helpkit_session=btnpctrivehac0v2am13yjhtwc80z2jqmlpvuwuralg1vwzxyu4znwuvt3ziy0vhzi9joghsc1rik1zsuu1nbnowt21mrmljk3lizu15wnbeb2htoddrrm53tdhlqlpyvxmwc3rxmtz5d0hyyjh0mhezqjc5tktutur2uxz4chzcvvo0b3ywnk8yog9lzytxqmzpcgh3pt0tltnnae1izgdvnurlqxzqbndlvwvszue9pq%3d%3d--915732f3ed00ab9c6a1886c7f25a3bafb3151ad6; path=/; httponly; secure
A cookie that was sent from the server to the browser.
path= indicates the path that must exist in the requested URL for the browser to send the cookie.secure instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.set-cookie
__cf_bm=c37bv3vo7befafxzml1iptwj2i._rpwc479ly7gpwja-1771961233-1.0.1.1-a0s..yv6d0clyaygkusbk53jduzqqm0cexqhazhpvqbm92lditk2o4fqjpwr_zqbusfgnf8lk2yciwmxcsrsbrqw4syhad77wrji4_ggwya; path=/; expires=tue, 24-feb-26 19:57:13 gmt; domain=.support.iubenda.com; httponly; secure
A cookie that was sent from the server to the browser.
expires= sets the maximum lifetime of the cookie using a specific date.domain= sets the domain to which the cookie will be sent.path= indicates the path that must exist in the requested URL for the browser to send the cookie.secure instructs the browser to only send the cookie back when HTTPS requests are used, making it more resistant to man-in-the-middle attacks.httponly forbids JavaScript from accessing the cookie. Helps mitigate the risk of client side scripts accessing a protected cookie.cf_bm is a cookie set by Cloudflare to support bot management. This is a technical cookie; it's exempt from GDPR and doesn't need user consent.x-envoy-upstream-service-time
42
x-trace-id
00-1a8327dc8d842ffda414606c91d27fc2-fb709b6b82ebd8b9-01
nel
{ "report_to": "nel-endpoint-freshdesk", "max_age": 2592000, "include_subdomains": true}
This header is part of the Reporting API specification. They are used to configure the reporting of network errors and other issues to a specified endpoint.
The
The
NEL (Network Error Logging) header configures the reporting of network errors.report_to defines the reporting group that reports for this NEL policy will be sent to. The reporting group details are specified in the Report-To header.max_age defines the number of seconds the browser should remember these settings. Prevents the browser from having to parse the JSON on each request.include_subdomains is a boolean that enables or disables NEL reporting for subdomains of the origin.report-to
{ "group": "nel-endpoint-freshdesk", "max_age": 2592000, "include_subdomains": true, "endpoints": [{"url": "https://nel.us-east-1.freshedge.net/nelreports/freshdesk"}]}
This header is part of the Reporting API specification. They are used to configure the reporting of network errors and other issues to a specified endpoint.
The
The
Report-To header specifies where reports should be sent.group defines the reporting group. Groups allow reports to be grouped logically; e.g. there could be a group for network errors and a second group for browser feature deprecation reports.max_age defines the number of seconds the browser should remember these settings. Prevents the browser from having to parse the JSON on each request.endpoints defines one or more URLs where the reports need to be send to. Multiple URLs can be specified for failover and load-balancing. Endpoints can be assigned a weight to distribute load, with each endpoint receiving a specified fraction of the reporting traffic. Endpoints can also be assigned a priority to set up fallback collectors.include_subdomains is a boolean that enables or disables NEL reporting for subdomains of the origin.x-server-processing-time-ms
48
x-fw-ratelimiting-managed
true
x-ratelimit-total
500
x-ratelimit-used-currentrequest
1
cf-cache-status
dynamic
Warning The
dynamic status indicates that Cloudflare did not cache the requested HTML page, similar to a "cache miss". By default, Cloudflare caches static assets such as images, CSS, and JavaScript but excludes HTML due to its dynamic nature. To cache HTML content, change the 'Cache Level' setting from dynamic to cache everything in Cloudflare. This adjustment allows HTML pages to be cached, leveraging Cloudflare's global network for faster and more efficient content delivery.server
cloudflare
content-security-policy
missing Add a
Content-Security-Policy header. The Content-Security-Policy header helps browsers prevent cross site scripting (XSS) and data injection attacks.referrer-policy
missing Add a
Referrer-Policy header. When a visitor navigates from one page to another, browsers often pass along referrer information. The Referrer-Policy header controls how much referrer information a browser can share. This is important to configure when private information is embedded in the path or query string and passed onto an external destination.permissions-policy
missing Add a
Permissions-Policy header. Restrict access to device features like the camera, microphone, location, accelerometer and much more.cross-origin-embedder-policy
missing Add a
Cross-Origin-Embedder-Policy to specify how this page can be loaded by cross-origin resources.cross-origin-opener-policy
missing Add a
Cross-Origin-Opener-Policy header to opt-in into better browser isolation.cross-origin-resource-policy
missing Add a
Cross-Origin-Resource-Policy header to specify who can load this page.x-frame-options
missing Add a
X-Frame-Options header. The X-Frame-Options header prevents this URL from being embedded in an iframe. This protects against clickjacking attacks. Alternatively, set a Content-Security-Policy header with a frame-ancestor directive.x-permitted-cross-domain-policies
missing Add a
X-Permitted-Cross-Domain-Policies header to prevent Flash, Adobe Reader and other clients from sharing data across domains.Questions or feedback? Email dries@buytaert.net.