[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: last firefox


Le 29/03/2025 à 17:58, T Lee Davidson a écrit :
On 3/29/25 12:27 PM, Fabien Bodard wrote:
New protection system that need an intervention from the user to enable embedded pages


[snip]>

According to my understanding from the "Learn more…" link on that page, it requires the site(s) administrator, not the user, to make changes. From the page, "Website will not allow Firefox to display the page if another site has embedded it" [1]: "Websites can utilize x-frame options or a content security policy to control whether other websites can embed them."

It appears the the X-frame options are to be set by the administrator of the site being embedded. And the Content Security Policy (CSP) is to be set by the admin of the site doing the embedding.

The X-frame options can now only disallow embedding. There was a "ALLOW- FROM origin" option, but that is now obsolete. From a quick read, it appears the the SourceForge page needs to issue a CSP header similar to:

Content-Security-Policy: default-src 'self' gambaswiki.org; img-src 'self' gambaswiki.org


[1] https://support.mozilla.org/en-US/kb/xframe-neterror-page? as=u&utm_source=inproduct



Mmm... I really have to host the website (just one HTML page) elsewhere now.

It's funny that nowadays, the more secure webbrowser are, the more internet is full of pages filled with junk ads and articles vomited by ChatGPT.

Regards,

--
Benoît Minisini.


Follow-Ups:
Re: last firefoxFabien Bodard <gambas.fr@xxxxxxxxx>
References:
last firefoxPhilippe Valarcher <philippe.valarcher@xxxxxxx>
Re: last firefoxYahoo <olivier.cruilles@xxxxxxxx>
Re: last firefoxFabien Bodard <gambas.fr@xxxxxxxxx>
Re: last firefoxT Lee Davidson <t.lee.davidson@xxxxxxxxx>