aboutsummaryrefslogtreecommitdiff
path: root/READMEs/README.content-security-policy.md
diff options
context:
space:
mode:
authorAndy Green <andy@warmcat.com>2020-09-29 17:17:13 +0100
committerAndy Green <andy@warmcat.com>2020-09-30 06:42:13 +0100
commit08c9395da53cb19a0f4761078f4426dc72a44e65 (patch)
treefdf12481bb569e0889ce78307987278b536bb1b7 /READMEs/README.content-security-policy.md
parentef8bfb24888dcd0e3967f91ad4cef9518ead3b76 (diff)
downloadlibwebsockets-08c9395da53cb19a0f4761078f4426dc72a44e65.tar.gz
update some wording
Diffstat (limited to 'READMEs/README.content-security-policy.md')
-rw-r--r--READMEs/README.content-security-policy.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/READMEs/README.content-security-policy.md b/READMEs/README.content-security-policy.md
index 0fe0cc20..462adce2 100644
--- a/READMEs/README.content-security-policy.md
+++ b/READMEs/README.content-security-policy.md
@@ -17,7 +17,7 @@ CSP lets the origin server define what is legitimate for the page it
served and everything else is denied.
The CSP for warmcat.com and libwebsockets.org looks like this,
-I removed a handful of whitelisted image sources like travis
+I removed a handful of approved image sources like travis
status etc for clarity...
```
@@ -40,7 +40,7 @@ provide a very significant increase in client security.
### Implications of strict CSP
Halfhearted CSP isn't worth much. The only useful approach is to start
-with `default-src 'none'` which disables everything, and then whitelist the
+with `default-src 'none'` which disables everything, and then allow the
minimum needed for the pages to operate.
"Minimum needed for the pages to operate" doesn't mean defeat the protections
@@ -63,7 +63,7 @@ files referenced in the document `<head>` section, along these lines:
#### Inline styles must die
All styling must go in one or more `.css` file(s) best served by the same
-server... while you can whitelist other sources in the CSP if you have to,
+server... while you can approve other sources in the CSP if you have to,
unless you control that server as well, you are allowing whoever gains
access to that server access to your users.