Skip to content
This repository has been archived by the owner on May 27, 2018. It is now read-only.

Verify the CSP header #1

Open
gjedeer opened this issue Dec 12, 2016 · 2 comments
Open

Verify the CSP header #1

gjedeer opened this issue Dec 12, 2016 · 2 comments
Milestone

Comments

@gjedeer
Copy link
Contributor

gjedeer commented Dec 12, 2016

Another thing which the add-on has to check is the CSP header. Because if it does not validate it too, JS could just be added as inline-code. And the add-on has to make sure that all script tags have an integrity attribute (could be done with PrivateBin/PrivateBin#82 if implemented).

@rugk
Copy link
Member

rugk commented Dec 12, 2016

I'd say we split this issue. This here for the CSP header detection and I'll create a new one for the forced integrity attribute verification.

@rugk rugk changed the title Check is the CSP header Verify the CSP header Dec 12, 2016
@rugk rugk added this to the first beta milestone Dec 12, 2016
@rugk
Copy link
Member

rugk commented Dec 12, 2016

What must be verified:

  • that script-src is given and it only allows 'self'
  • OR (less restrictive) that script-src must not include any unsafe-* value

All other things are as I see it optional security enhancements by the web admin and should not jeopardize the JS security.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants