block-all-mixed-content CSP Directive (block-all-mixed-content)
Why You Should Care About block-all-mixed-content
block-all-mixed-content was designed to strictly prevent any mixed content by blocking all HTTP resource loads on HTTPS pages. While this provides strong protection against mixed content attacks, it is more disruptive than upgrade-insecure-requests because it blocks resources rather than trying to load them over HTTPS.
Modern browsers already block active mixed content (scripts, stylesheets) by default. Passive mixed content (images, audio, video) is loaded with a warning. block-all-mixed-content extends the blocking to passive content as well.
This directive is now deprecated in favor of upgrade-insecure-requests, which is both less disruptive (resources still load if the HTTPS version works) and more secure (it does not fall back to HTTP). If you are configuring CSP, use upgrade-insecure-requests instead of block-all-mixed-content.
Testing Your Configuration
A security audit checks your CSP directives. If you have block-all-mixed-content, consider replacing it with upgrade-insecure-requests for better compatibility while maintaining the same security goal.