Skip to content

Add CSP frame-ancestors: 'none'#1080

Closed
pgporada wants to merge 4 commits intomainfrom
csp-frame-ancestors
Closed

Add CSP frame-ancestors: 'none'#1080
pgporada wants to merge 4 commits intomainfrom
csp-frame-ancestors

Conversation

@pgporada
Copy link
Member

"Setting this directive to 'none' is similar to X-Frame-Options: deny (which is also supported in older browsers)."

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors

"Setting this directive to 'none' is similar to X-Frame-Options: deny (which is also supported in older browsers)."
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors
Copy link
Contributor

@tdelmas tdelmas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you add the same change in config/_default/server.toml?

@bdaehlie bdaehlie requested a review from tdelmas September 28, 2023 14:32
@bdaehlie bdaehlie requested a review from scottmakestech July 31, 2025 13:16
@bdaehlie
Copy link
Contributor

@scottmakestech Can you review this? Is it still a desirable and non-breaking thing to do?

@scottmakestech scottmakestech self-assigned this Oct 21, 2025
scottmakestech added a commit that referenced this pull request Feb 13, 2026
scottmakestech added a commit to abetterinternet/website that referenced this pull request Feb 13, 2026
Sets frame-ancestors property to none to prevent nesting this site in an iframe. Although we already set X-Frame-Options to deny, this is the modern CSP method for declaring this setting. Sees letsencrypt/website#1080 and letsencrypt/website#2148.
scottmakestech added a commit to divviup/website that referenced this pull request Feb 13, 2026
Adds X-Frame-Options and CSP frame-ancestors headers to prevent this site from being embedded in an iframe on other domains. X-Frame-Options is the legacy header; frame-ancestors is the modern CSP equivalent. Both are set for maximum browser compatibility. See letsencrypt/website#1080 and letsencrypt/website#2148.
scottmakestech added a commit to memorysafety/website that referenced this pull request Feb 13, 2026
Adds X-Frame-Options and CSP frame-ancestors headers to prevent this site from being embedded in an iframe on other domains. X-Frame-Options is the legacy header; frame-ancestors is the modern CSP equivalent. Both are set for maximum browser compatibility. See letsencrypt/website#1080 and letsencrypt/website#2148.
scottmakestech added a commit to abetterinternet/website that referenced this pull request Feb 13, 2026
Sets frame-ancestors property to none to prevent nesting this site in an iframe. Although we already set X-Frame-Options to deny, this is the modern CSP method for declaring this setting. Sees letsencrypt/website#1080 and letsencrypt/website#2148.
scottmakestech added a commit to divviup/website that referenced this pull request Feb 13, 2026
Adds X-Frame-Options and CSP frame-ancestors headers to prevent this site from being embedded in an iframe on other domains. X-Frame-Options is the legacy header; frame-ancestors is the modern CSP equivalent. Both are set for maximum browser compatibility. See letsencrypt/website#1080 and letsencrypt/website#2148.
scottmakestech added a commit to memorysafety/website that referenced this pull request Feb 13, 2026
Adds X-Frame-Options and CSP frame-ancestors headers to prevent this site from being embedded in an iframe on other domains. X-Frame-Options is the legacy header; frame-ancestors is the modern CSP equivalent. Both are set for maximum browser compatibility. See letsencrypt/website#1080 and letsencrypt/website#2148.
pull bot pushed a commit to johnperez416/website that referenced this pull request Feb 14, 2026
Sets frame-ancestors property to none to prevent nesting this site in an
iframe. Although we already set X-Frame-Options to deny, this is the
modern CSP method for declaring this setting. Fixes letsencrypt#1080.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants