diff --git a/.travis.yml b/.travis.yml index 61a611250..a2dfb8024 100644 --- a/.travis.yml +++ b/.travis.yml @@ -17,7 +17,7 @@ addons: hosts: - admin.test.local - auth.test.local - - basicauth.test.local + - single_factor.test.local - dev.test.local - home.test.local - mx1.mail.test.local diff --git a/CONTRIBUTORS.md b/CONTRIBUTORS.md index 5ccc48b77..64d9b155c 100644 --- a/CONTRIBUTORS.md +++ b/CONTRIBUTORS.md @@ -4,3 +4,4 @@ who commit code to the project are encouraged to add their names here. Please keep the list sorted by first names Clement Michaud +Antoine Favre <@n4kre> diff --git a/README.md b/README.md index 383080f86..47f8a701d 100644 --- a/README.md +++ b/README.md @@ -101,6 +101,7 @@ Add the following lines to your **/etc/hosts** to alias multiple subdomains so t 127.0.0.1 admin.test.local 127.0.0.1 mx1.mail.test.local 127.0.0.1 mx2.mail.test.local + 127.0.0.1 single_factor.test.local 127.0.0.1 auth.test.local ### Run it! @@ -221,6 +222,28 @@ that the attacker must also require the certificate to retrieve the cookies. Note that using [HSTS] has consequences. That's why you should read the blog post nginx has written on [HSTS]. +### More protections measures + +You can also apply the following headers to your nginx configuration for +improving security. Please read the documentation of those headers before +applying them blindly. + +``` +# We don't want any credentials / TOTP secret key / QR code to be cached by +# the client +add_header Cache-Control "no-store"; +add_header Pragma "no-cache"; + +# Clickjacking / XSS protection + +# We don't want Authelia's login page to be rendered within a , +#