ubuntu:csp_content_security_policy

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
ubuntu:csp_content_security_policy [2020/04/15 08:33] peterubuntu:csp_content_security_policy [2023/06/04 11:30] (current) peter
Line 7: Line 7:
 **NOTE**: It is known that having both **Content-Security-Policy** and **X-Content-Security-Policy** or **X-Webkit-CSP** causes unexpected behaviours on certain versions of browsers.  Please avoid using deprecated **X-*** headers. **NOTE**: It is known that having both **Content-Security-Policy** and **X-Content-Security-Policy** or **X-Webkit-CSP** causes unexpected behaviours on certain versions of browsers.  Please avoid using deprecated **X-*** headers.
 </WRAP> </WRAP>
 +
 +----
  
 ===== Directive Reference ===== ===== Directive Reference =====
Line 29: Line 31:
 |plugin-types|application/pdf|Defines valid MIME types for plugins invoked via <color red><object></color> and <color red><embed></color> To load an <color red><applet></color> you must specify <color red>application/x-java-applet</color>.| |plugin-types|application/pdf|Defines valid MIME types for plugins invoked via <color red><object></color> and <color red><embed></color> To load an <color red><applet></color> you must specify <color red>application/x-java-applet</color>.|
 |base-uri| |Restricts the URLs that can be used to specify the document base URL.| |base-uri| |Restricts the URLs that can be used to specify the document base URL.|
 +
 +----
  
 ===== Source List Reference ===== ===== Source List Reference =====
Line 48: Line 52:
 |'unsafe-eval'|script-src 'unsafe-eval'|Allows unsafe dynamic code evaluation such as JavaScript <color red>eval()</color>.| |'unsafe-eval'|script-src 'unsafe-eval'|Allows unsafe dynamic code evaluation such as JavaScript <color red>eval()</color>.|
  
 +----
  
 ===== How it Works ===== ===== How it Works =====
Line 59: Line 64:
   * **none** indicates that nothing should be loaded for a given directive e.g. object-src 'none' indicates that no plugins—such as Flash or Java—should be loaded.   * **none** indicates that nothing should be loaded for a given directive e.g. object-src 'none' indicates that no plugins—such as Flash or Java—should be loaded.
  
 +----
  
 ===== Content-Security-Policy Examples ===== ===== Content-Security-Policy Examples =====
Line 72: Line 78:
 </code> </code>
  
 +----
  
 ==== Only Allow Scripts from the same origin ==== ==== Only Allow Scripts from the same origin ====
Line 79: Line 86:
 </code> </code>
  
 +----
  
 ==== Allow Same Origin, Google Analytics, and Google AJAX CDN ==== ==== Allow Same Origin, Google Analytics, and Google AJAX CDN ====
Line 86: Line 94:
 </code> </code>
  
 +----
  
 ==== Starter Policy ==== ==== Starter Policy ====
Line 95: Line 104:
 </code> </code>
  
 +----
  
 ==== Mixed Content Policy ==== ==== Mixed Content Policy ====
Line 122: Line 132:
 </code> </code>
  
 +----
  
 ===== Prevent Clickjacking ===== ===== Prevent Clickjacking =====
Line 161: Line 172:
 </WRAP> </WRAP>
  
 +----
  
 ===== Re-factoring inline code ===== ===== Re-factoring inline code =====
Line 233: Line 245:
 </code> </code>
  
 +----
  
 ===== Content-Security-Policy Error Messages ===== ===== Content-Security-Policy Error Messages =====
Line 248: Line 261:
 </code> </code>
  
 +
 +----
  
 ===== Server Side Configuration ===== ===== Server Side Configuration =====
Line 260: Line 275:
 Header set Content-Security-Policy "default-src 'self';" Header set Content-Security-Policy "default-src 'self';"
 </code> </code>
 +
 +----
  
 ==== Nginx Content-Security-Policy Header ==== ==== Nginx Content-Security-Policy Header ====
Line 271: Line 288:
 You can also append **always** to the end to ensure that nginx sends the header reguardless of response code. You can also append **always** to the end to ensure that nginx sends the header reguardless of response code.
  
 +----
  
 ==== IIS Content-Security-Policy Header ==== ==== IIS Content-Security-Policy Header ====
Line 286: Line 304:
 </code> </code>
  
 +----
  
 ===== Other Examples of CSP ===== ===== Other Examples of CSP =====
Line 301: Line 320:
  
 Note how Facebook makes use of wildcards for both subdomains, as well as port numbers in connect-src. Note how Facebook makes use of wildcards for both subdomains, as well as port numbers in connect-src.
 +
 +----
  
 ==== Twitter ==== ==== Twitter ====
Line 322: Line 343:
 Notice how the directives all contain https:, thus enforcing SSL. Notice how the directives all contain https:, thus enforcing SSL.
  
 +----
  
 ===== Capturing CSP Violations with report-uri ===== ===== Capturing CSP Violations with report-uri =====
Line 350: Line 372:
 </code> </code>
  
 +----
  
 ===== Content-Security-Policy-Report-Only ===== ===== Content-Security-Policy-Report-Only =====
Line 355: Line 378:
 If you're thinking of implementing CSP, you can take your CSP for a dry run by using the **Content-Security-Policy-Report-Only** HTTP header instead of **Content-Security-Policy**.  This works just the same way as the CSP header, but it only reports on violations without actually enforcing the policy by blocking restricted resources.  You can even use both headers at the same time, enforcing one policy while monitoring the effect any changes might have in the other. If you're thinking of implementing CSP, you can take your CSP for a dry run by using the **Content-Security-Policy-Report-Only** HTTP header instead of **Content-Security-Policy**.  This works just the same way as the CSP header, but it only reports on violations without actually enforcing the policy by blocking restricted resources.  You can even use both headers at the same time, enforcing one policy while monitoring the effect any changes might have in the other.
  
 +----
  
 ===== Test ===== ===== Test =====
Line 362: Line 386:
 https://report-uri.io/home/tools https://report-uri.io/home/tools
  
 +----
  
 ===== References ===== ===== References =====
ubuntu/csp_content_security_policy.1586939600.txt.gz · Last modified: 2020/07/15 09:30 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki