SixXS::Sunset 2017-06-06

Content Security Policy breaks *.sixxs.org
[bh] Shadow Hawkins on Monday, 04 November 2013 11:19:56
Ever since the "Hardening the SixXS Website" news announcement, websites visited using *.sixxs.org do not render correctly because of the "Content-Security-Policy:default-src 'self'" header. For example, opening yahoo.com.sixxs.org in Google Chrome gives the following errors in the console, each one repeated dozens of times: Refused to execute inline script because it violates the following Content Security Policy directive: "default-src 'self'". Note that 'script-src' was not explicitly set, so 'default-src' is used as a fallback. Refused to load the stylesheet '<URL>' because it violates the following Content Security Policy directive: "default-src 'self'". Note that 'style-src' was not explicitly set, so 'default-src' is used as a fallback. Refused to load the image '<URL>' because it violates the following Content Security Policy directive: "default-src 'self'". Note that 'img-src' was not explicitly set, so 'default-src' is used as a fallback. Is there anything I can do to work around this?
Content Security Policy breaks *.sixxs.org
[ch] Jeroen Massar SixXS Staff on Monday, 04 November 2013 11:57:14
Is there anything I can do to work around this?
Reload, that should resolve it. There is no point for us to set those headers for .sixxs.org as we do not control those sites, hence they are not being set for those sites any more.

Please note Posting is only allowed when you are logged in.

Static Sunset Edition of SixXS
©2001-2017 SixXS - IPv6 Deployment & Tunnel Broker