The HTTP Content-Security-Policy (CSP) default-src directive serves as a fallback for the other CSP fetch directives. For each of the following directives that are absent, the user agent will look for the default-src directive and will use this value for it:
child-srcconnect-srcfont-srcframe-srcimg-srcmanifest-srcmedia-srcobject-srcscript-srcstyle-srcworker-src| CSP version | 1 |
|---|---|
| Directive type | Fetch directive |
One or more sources can be allowed for the default-src policy:
Content-Security-Policy: default-src <source>; Content-Security-Policy: default-src <source> <source>;
<source> can be one of the following:
'*'), and you may use a wildcard (again, '*') as the port number, indicating that all legal ports are valid for the source.http://*.example.com: Matches all attempts to load from any subdomain of example.com using the http: URL scheme.mail.example.com:443: Matches all attempts to access port 443 on mail.example.com.https://store.example.com: Matches all attempts to access store.example.com using https:.data: Allows data: URIs to be used as a content source. This is insecure; an attacker can also inject arbitrary data: URIs. Use this sparingly and definitely not for scripts.
mediastream: Allows mediastream: URIs to be used as a content source.blob: Allows blob: URIs to be used as a content source.filesystem: Allows filesystem: URIs to be used as a content source.'self'blob and filesystem from source directives. Sites needing to allow these content types can specify them using the Data attribute.'unsafe-inline'<script> elements, javascript: URLs, inline event handlers, and inline <style> elements. You must include the single quotes.'unsafe-eval'eval() and similar methods for creating code from strings. You must include the single quotes.'none''unsafe-inline' which could still be set for older browsers without nonce support.script-src for external scripts.strict-dynamic source expression specifies that the trust explicitly given to a script present in the markup, by accompanying it with a nonce or a hash, shall be propagated to all the scripts loaded by that root script. At the same time, any whitelist or source expressions such as 'self' or 'unsafe-inline' will be ignored. See script-src for an example.default-src
If there are other directives specified, default-src does not influence them. The following header
Content-Security-Policy: default-src 'self'; script-src https://example.com
will be the same as:
Content-Security-Policy: connect-src 'self';
font-src 'self';
frame-src 'self';
img-src 'self';
manifest-src 'self';
media-src 'self';
object-src 'self';
script-src https://example.com;
style-src 'self';
worker-src 'self' | Specification | Status | Comment |
|---|---|---|
| Content Security Policy Level 3 The definition of 'default-src' in that specification. | Editor's Draft | Added frame-src, manifest-src and worker-src as defaults. |
| Content Security Policy Level 2 The definition of 'default-src' in that specification. | Recommendation | Initial definition. |
| Feature | Chrome | Edge | Firefox | Internet Explorer | Opera | Safari |
|---|---|---|---|---|---|---|
| Basic support | 25 | 14 | 23 | No | 15 | 7 |
| Feature | Android webview | Chrome for Android | Edge mobile | Firefox for Android | Opera Android | iOS Safari | Samsung Internet |
|---|---|---|---|---|---|---|---|
| Basic support | Yes | Yes | ? | 23 | ? | 7.1 | ? |
Content-Security-Policyconnect-srcfont-srcframe-srcimg-srcmanifest-srcmedia-srcobject-srcscript-srcstyle-srcworker-src
© 2005–2018 Mozilla Developer Network and individual contributors.
Licensed under the Creative Commons Attribution-ShareAlike License v2.5 or later.
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/default-src