Uploaded image for project: 'OpenShift Console'
  1. OpenShift Console
  2. CONSOLE-4170

Determine which CSP headers could be added to the console

XMLWordPrintable

    • Icon: Spike Spike
    • Resolution: Done
    • Icon: Undefined Undefined
    • None
    • None
    • None
    • None
    • None
    • HAC Infra OCP - Sprint 259

      There are tseveral feature requests for adding CSP(Content Security Policy) header to the Console.

      Content-Security-Policy (CSP) header provides a defense-in-depth measure in client-side security, as a second layer of protection against Cross-site Scripting (XSS) and clickjacking attacks.

      Currently there are some other related security headers present in the OpenShift console that cover some aspects of CSP functionality:

      • X-Frame-Options: When set to DENY, this disallows allow attempts to iframe site (related CSP directive: `frame-ancestors`)
      • X-XSS-Protection: Protects against reflected XSS attacks in Chrome and Internet Explorer (related CSP directive: `unsafe-inline`)
      • X-Content-Type-Options: Protects against loading of external scripts and stylesheets unless the server indicates the correct MIME type, which can lead to some types of XSS attacks.

      RFEs:

       

      AC:

      • Determine which CSP headers could be add to the console and what should be their values, in order not to break Console or plugins.
      • Create a doc with the finding on which headers we will add and which not, together with reasoning.

       

      CSP Headers docs - https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP

              vszocs@redhat.com Vojtech Szocs
              jhadvig@redhat.com Jakub Hadvig
              None
              None
              None
              None
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: