|
|
|
@@ -287,6 +287,26 @@ matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] |
|
|
|
# Of course, a better solution is to just stop using browsers (like Chrome), which participate in such tracking practices. |
|
|
|
matrix_nginx_proxy_floc_optout_enabled: true |
|
|
|
|
|
|
|
# HSTS Preloading Enable |
|
|
|
# |
|
|
|
# In its strongest and recommended form, the [HSTS policy](https://www.chromium.org/hsts) includes all subdomains, and |
|
|
|
# indicates a willingness to be “preloaded” into browsers: |
|
|
|
# `Strict-Transport-Security: max-age=31536000; includeSubDomains; preload` |
|
|
|
# For more information visit: |
|
|
|
# - https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security |
|
|
|
# - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security |
|
|
|
# - https://hstspreload.org/#opt-in |
|
|
|
matrix_nginx_proxy_hsts_preload_enabled: false |
|
|
|
|
|
|
|
# X-XSS-Protection Enable |
|
|
|
# Stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. |
|
|
|
# Note: Not applicable for grafana |
|
|
|
# |
|
|
|
# Learn more about it is here: |
|
|
|
# - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection |
|
|
|
# - https://portswigger.net/web-security/cross-site-scripting/reflected |
|
|
|
matrix_nginx_proxy_xss_protection: "1; mode=block" |
|
|
|
|
|
|
|
# Specifies the SSL configuration that should be used for the SSL protocols and ciphers |
|
|
|
# This is based on the Mozilla Server Side TLS Recommended configurations. |
|
|
|
# |
|
|
|
|