ubuntu:csp_content_security_policy
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
ubuntu:csp_content_security_policy [2020/04/15 08:32] – created peter | ubuntu:csp_content_security_policy [2023/06/04 11:30] (current) – peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Ubuntu - CSP (Content Security Policy) ====== | ====== Ubuntu - CSP (Content Security Policy) ====== | ||
+ | |||
+ | The **Content-Security-Policy** HTTP response header helps you reduce XSS risks on modern browsers by declaring what dynamic resources are allowed to load via a HTTP Header. | ||
+ | |||
+ | |||
+ | <WRAP notice> | ||
+ | **NOTE**: It is known that having both **Content-Security-Policy** and **X-Content-Security-Policy** or **X-Webkit-CSP** causes unexpected behaviours on certain versions of browsers. | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Directive Reference ===== | ||
+ | |||
+ | The Content-Security-Policy header value is made up of one or more directives (defined below), multiple directives are separated with a semicolon ; | ||
+ | |||
+ | ^Directive^Example Value^Description^ | ||
+ | |default-src|' | ||
+ | |script-src|' | ||
+ | |style-src|' | ||
+ | |img-src|' | ||
+ | |connect-src|' | ||
+ | |font-src|font.example.com|Defines valid sources of fonts.| | ||
+ | |object-src|' | ||
+ | |media-src|media.example.com|Defines valid sources of audio and video, e.g. HTML5 <color red>< | ||
+ | |frame-src|' | ||
+ | |sandbox|allow-forms allow-scripts|Enables a sandbox for the requested resource similar to the <color red> | ||
+ | |report-uri|/ | ||
+ | |child-src|' | ||
+ | |form-action|' | ||
+ | |frame-ancestors|' | ||
+ | |plugin-types|application/ | ||
+ | |base-uri| |Restricts the URLs that can be used to specify the document base URL.| | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Source List Reference ===== | ||
+ | |||
+ | All of the directives that end with **-src** support similar values known as a source list. Multiple source list values can be space separated with the exception of **' | ||
+ | |||
+ | Domain patterns can contain both protocol and ports if you want to be specific: **< | ||
+ | |||
+ | ^Source Value^Example^Description^ | ||
+ | |*|img-src *|Wildcard, allows any URL except data: blob: filesystem: schemes.| | ||
+ | |' | ||
+ | |' | ||
+ | |data: | ||
+ | |domain.example.com|img-src domain.example.com|Allows loading resources from the specified domain name.| | ||
+ | |*.example.com|img-src *.example.com|Allows loading resources from any subdomain under <color red> | ||
+ | |< | ||
+ | |https: | ||
+ | |' | ||
+ | |' | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== How it Works ===== | ||
+ | |||
+ | The **default-src**, | ||
+ | |||
+ | All directives follow the same pattern: | ||
+ | |||
+ | * **self** is used to refer to the current domain. | ||
+ | * one or more URLs can be specified in a space-separated list. | ||
+ | * **none** indicates that nothing should be loaded for a given directive e.g. object-src ' | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Content-Security-Policy Examples ===== | ||
+ | |||
+ | Here a few common scenarios for content security policies: | ||
+ | |||
+ | ==== Allow everything but only from the same origin ==== | ||
+ | |||
+ | At its simplest, we could define a CSP to load resources only from the current domain as follows: | ||
+ | |||
+ | <code bash> | ||
+ | default-src ' | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Only Allow Scripts from the same origin ==== | ||
+ | |||
+ | <code bash> | ||
+ | script-src ' | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Allow Same Origin, Google Analytics, and Google AJAX CDN ==== | ||
+ | |||
+ | <code bash> | ||
+ | script-src ' | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Starter Policy ==== | ||
+ | |||
+ | This policy allows images, scripts, AJAX, and CSS from the same origin, and does not allow any other resources to load (eg object, frame, media, etc). It is a good starting point for many sites. | ||
+ | |||
+ | <code bash> | ||
+ | default-src ' | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Mixed Content Policy ==== | ||
+ | |||
+ | In order to prevent mixed content (resources being loaded over http, from a document loaded over https), one can use the value " | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | img-src https: data:; media-src https:; | ||
+ | style-src ' | ||
+ | </ | ||
+ | |||
+ | The policy prevents mixed content, allows for scheme " | ||
+ | |||
+ | Mixed Content has two categories: Active and Passive. Passive content consists of " | ||
+ | |||
+ | An example to block only passive mixed content: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | An example to block only active mixed content: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Prevent Clickjacking ===== | ||
+ | |||
+ | The established way of preventing clickjacking involves the use of the header X-Frame-Options (see: [[https:// | ||
+ | |||
+ | To prevent all framing of your content use: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | |||
+ | To allow for your site only, use: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | |||
+ | To allow for trusted domain (my-trusty-site.com), | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | <WRAP warning> | ||
+ | **WARNING: | ||
+ | |||
+ | Also, keep in mind the following (from the [[https:// | ||
+ | |||
+ | < | ||
+ | The frame-ancestors directive MUST be ignored when monitoring a policy, and when a contained in a policy defined via a meta element. | ||
+ | </ | ||
+ | |||
+ | In other words, this will not work when CSP is in a **< | ||
+ | |||
+ | When a report is generated, the **blocked-uri** will only have a value if it is the same origin as the page. | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Re-factoring inline code ===== | ||
+ | |||
+ | By default CSP disables any unsigned JavaScript code placed inline in the HTML source, such as this: | ||
+ | |||
+ | <code bash> | ||
+ | < | ||
+ | </ | ||
+ | |||
+ | |||
+ | The inline code can be enabled by specifying its SHA256 hash in the CSP header: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | </ | ||
+ | |||
+ | |||
+ | This particular script' | ||
+ | |||
+ | <code bash> | ||
+ | echo -n 'var foo = " | ||
+ | </ | ||
+ | |||
+ | |||
+ | Some browsers (e.g. Chrome) will also display the hash of the script in JavaScript console warning when blocking an unsigned script. | ||
+ | |||
+ | The inline code can be also simply moved to a separate JavaScript file: | ||
+ | |||
+ | <code bash> | ||
+ | < | ||
+ | </ | ||
+ | |||
+ | becomes: | ||
+ | |||
+ | <code bash> | ||
+ | <script src=" | ||
+ | </ | ||
+ | |||
+ | with ' | ||
+ | |||
+ | The inline code restriction also applies to inline event handlers, so that the following construct will be blocked under CSP: | ||
+ | |||
+ | <code bash> | ||
+ | <button id=" | ||
+ | </ | ||
+ | |||
+ | This should be replaced by `addEventListener' | ||
+ | |||
+ | <code bash> | ||
+ | document.getElementById(" | ||
+ | </ | ||
+ | |||
+ | Variable assignment in inline scripts. Rather than do this: | ||
+ | |||
+ | <code bash> | ||
+ | < | ||
+ | </ | ||
+ | |||
+ | Leverage HTML5' | ||
+ | |||
+ | <code bash> | ||
+ | <body data-foo=" | ||
+ | ... | ||
+ | </ | ||
+ | </ | ||
+ | |||
+ | And access the value by doing: | ||
+ | |||
+ | <code bash> | ||
+ | var itemID = document.body.getAttribute(" | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Content-Security-Policy Error Messages ===== | ||
+ | |||
+ | In Chrome when a Content Security Policy Script Violation happens you get a message like this one in the Chrome Developer Tools: | ||
+ | |||
+ | <code bash> | ||
+ | Refused to load the script ' | ||
+ | </ | ||
+ | |||
+ | In Firefox you might see messages like this in the Web Developer Tools: | ||
+ | |||
+ | <code bash> | ||
+ | Content Security Policy: A violation occurred for a report-only CSP policy ("An attempt to execute inline scripts has been blocked" | ||
+ | </ | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Server Side Configuration ===== | ||
+ | |||
+ | Any server side programming environment should allow you to send back a custom HTTP response header. You can also use your web server to send back the header. | ||
+ | |||
+ | ==== Apache Content-Security-Policy Header ==== | ||
+ | |||
+ | Add the following to your httpd.conf in your **VirtualHost** or in an **.htaccess** file: | ||
+ | |||
+ | <code bash> | ||
+ | Header set Content-Security-Policy " | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Nginx Content-Security-Policy Header ==== | ||
+ | |||
+ | In your **server {}** block add: | ||
+ | |||
+ | <code bash> | ||
+ | add_header Content-Security-Policy " | ||
+ | </ | ||
+ | |||
+ | You can also append **always** to the end to ensure that nginx sends the header reguardless of response code. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== IIS Content-Security-Policy Header ==== | ||
+ | |||
+ | You can use the HTTP Response Headers GUI in IIS Manager or add the following to your web.config: | ||
+ | |||
+ | <code bash> | ||
+ | < | ||
+ | < | ||
+ | < | ||
+ | <add name=" | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Other Examples of CSP ===== | ||
+ | |||
+ | ==== Facebook ==== | ||
+ | |||
+ | This is how Facebook implements CSP (line breaks added for readability). | ||
+ | |||
+ | <code bash> | ||
+ | default-src *; | ||
+ | script-src https:// | ||
+ | style-src * ' | ||
+ | connect-src https:// | ||
+ | </ | ||
+ | |||
+ | Note how Facebook makes use of wildcards for both subdomains, as well as port numbers in connect-src. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Twitter ==== | ||
+ | |||
+ | This is how Twitter implements CSP. | ||
+ | |||
+ | <code bash> | ||
+ | default-src https:; | ||
+ | connect-src https:; | ||
+ | font-src https: data:; | ||
+ | frame-src https: twitter:; | ||
+ | frame-ancestors https:; | ||
+ | img-src https: data:; | ||
+ | media-src https:; | ||
+ | object-src https:; | ||
+ | script-src ' | ||
+ | style-src ' | ||
+ | report-uri https:// | ||
+ | </ | ||
+ | |||
+ | Notice how the directives all contain https:, thus enforcing SSL. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Capturing CSP Violations with report-uri ===== | ||
+ | |||
+ | Any violation of your CSP will be logged to the browser console. | ||
+ | |||
+ | Instead, you can use the **report-uri** to log all CSP violations. | ||
+ | |||
+ | To illustrate this, suppose we have a CSP as follows: | ||
+ | |||
+ | <code bash> | ||
+ | Content-Security-Policy: | ||
+ | report-uri: https:// | ||
+ | </ | ||
+ | |||
+ | This means the browser is only permitted to load resources from our own domain. | ||
+ | |||
+ | <code bash> | ||
+ | { | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | " | ||
+ | } | ||
+ | } | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Content-Security-Policy-Report-Only ===== | ||
+ | |||
+ | If you're thinking of implementing CSP, you can take your CSP for a dry run by using the **Content-Security-Policy-Report-Only** HTTP header instead of **Content-Security-Policy**. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Test ===== | ||
+ | |||
+ | https:// | ||
+ | |||
+ | https:// | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== References ===== | ||
+ | |||
+ | Want more info on CSP, checkout these links: | ||
+ | |||
+ | * [[http:// | ||
+ | * [[http:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | * [[https:// | ||
+ | |||
+ | * https:// | ||
+ | * https:// | ||
+ | * https:// | ||
+ | * http:// | ||
+ | |||
+ | * https:// | ||
+ | |||
+ | * http:// | ||
+ | |||
ubuntu/csp_content_security_policy.1586939566.txt.gz · Last modified: 2020/07/15 09:30 (external edit)