mirror of
https://github.com/nsupdate-info/nsupdate.info.git
synced 2026-04-25 08:35:56 +03:00
[GH-ISSUE #281] improve security score #223
Labels
No labels
bug
bug
duplicate
easy
easy
enhancement
enhancement
invalid
needs help
pull-request
scalability
security
task
urgent
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nsupdate.info-nsupdate-info#223
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ThomasWaldmann on GitHub (Aug 28, 2016).
Original GitHub issue: https://github.com/nsupdate-info/nsupdate.info/issues/281
Originally assigned to: @elnappo on GitHub.
https://observatory.mozilla.org/analyze.html?host=nsupdate.info
https://securityheaders.com/?q=nsupdate.info&followRedirects=on
@elnappo commented on GitHub (Sep 5, 2016):
Could you provide the current nginx configuration? Some headers like
X-XSS-Protection,X-Content-Type-Options, orHTTP Strict Transport Securitycould also be added by Django itself. OWASP provides a good reference of security related headers https://www.owasp.org/index.php/OWASP_Secure_Headers_Project#X-Content-Type-OptionsAt least we should set the following headers:
X-Frame-Options: denyX-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffStrict-Transport-Security: max-age=31536000should make no problems with updates clients which does not support TLS?@ThomasWaldmann commented on GitHub (Sep 5, 2016):
Stuff that can be as well solved in the application maybe better gets solved there, so everybody automatically gets it.
@elnappo commented on GitHub (Sep 6, 2016):
After a deeper look at the problem I think its best to let the proxy (e.g. nginx) handle these security headers. Letting the app set these headers could lead to the following problems:
So, I propose the following changes:
@ThomasWaldmann commented on GitHub (Sep 6, 2016):
Hmm, couldn't that be confusing?
If we do it in the dev setup, will people then run the dev setup in production to get the security headers? Or will they skip configuring security headers because they were there in the dev setup?
@elnappo commented on GitHub (Sep 7, 2016):
I don't think so, dev setup is for developers who hopefully know what they are doing. I added the headers in the dev configuration to make sure that problems with these headers are recognised before going into production. We should add a secure example configuration in the documentation and a link to e.g. Observatory. I could add a comment in the dev configuration to make this more clear.
@elnappo commented on GitHub (Dec 29, 2018):
I updated the branch.
X-XSS-Protection: 1; mode=blockandX-Content-Type-Options: nosniffare now also set by Django.@ThomasWaldmann commented on GitHub (Mar 4, 2019):
I set some stuff via nginx now, observatory shows "C" score now (up from "F"), but still some stuff to be improved.
@elnappo commented on GitHub (Mar 5, 2019):
Added
Referrer-Policyheader@ThomasWaldmann commented on GitHub (Dec 27, 2019):
With went from C to B on: https://securityheaders.com/?q=nsupdate.info&followRedirects=on
@elnappo commented on GitHub (Dec 27, 2019):
For nsupdate.info we could also:
@elnappo commented on GitHub (Dec 29, 2019):
Expect-CT: enforce, max-age=21600