I'm a bit disappointed that web2py by default sets `X-Powered-By: web2py` 
in the http header, thus making it easier for web-scanning tools to detect 
the software running behind a web site, and allow more targetted attacks. 
Is there an easy config option to efficiently turn this off for all pages / 
json responses etc served by web2py? Also, are there other ways to obscure 
the fact that it is web2py / python running on a web server, and reduce 
information disclosure? For example, can anyone detect what python version 
I'm running by using web queries: I see that rocket server puts the python 
version in the `Server:` header, which seems bad to me, although my 
production machine simply returns `Server: nginx` which is a little better, 
I suppose. I suspect it will never be possible to obscure the software 
entirely, but anything that makes it harder for the script kiddies seems 
like an easy win to me.

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to web2py+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/web2py/09c4e377-2c90-4b9b-abdf-ea6b4967d18b%40googlegroups.com.

Reply via email to