by syjer on 9/26/16, 6:30 PM with 24 comments
by Animats on 9/27/16, 4:17 AM
by niftich on 9/26/16, 7:14 PM
On the HN thread on the cited study, I posted [1] that C-S-P is 'another damn header' that has to be included to stay secure and, unlike many of the 'other damn headers', its value is hopefully fine-tuned to the particular protected resource, unlike a site-wide hardcoded string.
I think more so than another configuration helper tool, what the Web really needs is a CSP rule engine evaluator that allows rules to be specified declaratively ahead of time, and integrates with some existing web framework to allow the resulting C-S-P value to be spliced into the outgoing response. Portions of this approach are implicitly proposed by OWASP here [2], but I've yet to see it written down formally, as opposed to just some code example. Widely adopting this approach would result in a paradigm shift that lifts C-S-P from 'just a header' to a first-class construct integral to the operation of the web application.
[1] https://news.ycombinator.com/item?id=12408680
[2] https://www.owasp.org/index.php/Content_Security_Policy#Coun...
by Alex3917 on 9/26/16, 10:45 PM
- Doesn't properly take into account default-src. We have default-src 'none', but it's telling us that we haven't set object-src to none.
- Says "Directive 'meta' is not a known CSP directive", despite the advice to use the meta tag here: http://www.html5rocks.com/en/tutorials/security/content-secu...
For reference these are the issues that came up with the CSP on the front end for our oembed:
https://oembed.fwdeveryone.com?threadId=Nh4apRjSR7qS5y4aGd3N...
by aegarbutt on 9/26/16, 8:19 PM
Rolls off the tongue better than https://csp-evaluator.withgoogle.com.
by phs318u on 9/26/16, 11:56 PM
In which case, quis checks ipsos checkers? ie will we eventually find we need a checker checker checker, and so on ad infinitum?
by intrasight on 9/27/16, 4:18 AM
by zerognowl on 9/26/16, 6:58 PM
by anaptdemise on 9/27/16, 6:13 AM
by ilaksh on 9/26/16, 10:15 PM