Security Report Summary
A+
Site: https://www.tartarefr.eu/
IP Address: 51.254.66.51
Report Time: 17 Nov 2017 21:35:55 UTC
Report Short URL: https://schd.io/1vwO
Headers:
  • X-Frame-Options
  • X-XSS-Protection
  • X-Content-Type-Options
  • Referrer-Policy
  • Content-Security-Policy
  • Strict-Transport-Security
Raw Headers
HTTP/1.1200 OK
DateFri, 17 Nov 2017 21:35:50 GMT
ServerApache
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1;mode=block
X-Content-Type-Optionsnosniff
Referrer-Policysame-origin
Expect-CTmax-age=0; report-uri="https://report.tartarefr.eu/report.php?type=ect"
Public-Key-Pinspin-sha256="RUAn2aRe7tHkVeAyNRyUEqdOfzuFQC2AGA6104fw2bE=";pin-sha256="V1SS/CF9FytT08qQqf7EgppgzhyQzgT0fnbBsXwOvUI=";pin-sha256="ayegaE4mPx6rRMPoNM2lyKx6BPMWUh42lLj5Na8rhnI=";max-age=2592000;includeSubdomains;report-uri="https://report.tartarefr.eu/report.php?type=pkp"
Content-Security-Policydefault-src 'self' data: www.tartarefr.eu ; script-src 'self' www.tartarefr.eu ; style-src 'self' 'unsafe-inline' fonts.googleapis.com www.tartarefr.eu code.jquery.com ; font-src 'self' data: fonts.gstatic.com www.tartarefr.eu ; img-src 'self' data: code.jquery.com secure.gravatar.com www.tartarefr.eu ; report-uri https://report.tartarefr.eu/report.php?type=csp
Strict-Transport-Securitymax-age=31536000;includeSubDomains
Link<https://www.tartarefr.eu/index.php?rest_route=/>; rel="https://api.w.org/"
Transfer-Encodingchunked
Content-Typetext/html; charset=UTF-8
Other Services
Okta Never build auth again. Create a free-forever Okta developer account to add social login, MFA, and OpenID Connect support to your app in minutes.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block".
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Public-Key-PinsHTTP Public Key Pinning protects your site from MiTM attacks using rogue X.509 certificates. By whitelisting only the identities that the browser should trust, your users are protected in the event a certificate authority is compromised. Analyse this policy in more detail.
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.