Top-5 HTTP Security Headers in 2020
Nowadays, security is important as never before. I've prepared a very small article about the Top-5 security headers in 2020 that will help your site keep your users in safety. Have a nice reading!
One of the most important security header. It was created to prevent the usage of any resource from an untrusted source.
Let's go to the short example first:
Evil Bob found XSS vulnerability on Alice's site. He decides to inject the script into the web-page to steal some customer data. He put this script tag into her page
and waits for the results
Luckily, Alice knows about CSP header and already added it to the response:
Content-Security-Policy: default-src 'self'. Now, a browser already knows, that scripts (and images, and fonts, and styles) not from origin domains are forbidden to use and Bob's attack fails.
Withing this header you can deny inline scripts and eval usage (goodbye inline XSS), specify a checksum for the scripts (good by substitution of the 3rd party scripts), allow specific domains for your images, fonts, and styles. It can restrict fetch requests, deny usage of your site inside an iframe (goodbye CSRF) and much more. CSP header is very flexible and can support almost all of your needs.
Can I use?
CSP header supported by almost all browsers including IE (but with a special name — X-Content-Security-Policy). Some of the directives may not be supported across different browsers but this will not ruin the header.
- Allow all remote resources from your domain (No external API calls allowed!):
Content-Security-Policy: default-src 'self
- Allow all remote resource from your domain and external API calls (IFraming is allowed):
Content-Security-Policy: default-src 'self'; connect-src 'self' https://my-example-api.ua
- Allow all remote resource from your domain, external API calls, disallow iframing your site:
Content-Security-Policy: default-src 'self'; connect-src 'self' https://my-example-api.ua; frame-ancestors 'none';
- Disallow everything except whitelisted:
Content-Security-Policy: default-src 'none'; img-src 'self'; font-src 'self'; connect-src 'self' https://my-example-api.ua; script-src 'self'; style-src 'self'; frame-ancestors 'none'
- Disallow everything except whitelisted (with inline css):
Content-Security-Policy: default-src 'none'; img-src 'self'; font-src 'self'; connect-src 'self' https://my-example-api.ua; script-src 'self'; style-src 'self' 'unsafe-inline'; frame-ancestors 'none'
Important Notice: If you need to deny the possibility to iframe your site in IE — you should use X-Frame-Options
This is a bit tricky header but it works very well with CSP, so it worth mentioning.
This header tells the browser, strictly follow provided Mime/Type, and don't try to guess.
Can I use?
Supported by all browsers except Safari.
Only one option is possible:
This header is designed to turn off features that you don't expect to be used.
Alice has a nice and shiny site with a big audience. Evil Bob found XSS and decided to use Alice's site for spying using a user's web camera. So he injects malicious code and waits for the dozen of the new videos.
But, fortunately, Alice already set Feature-Policy header to
Feature-Policy: camera 'none'
Now, browsers know, that using a camera is not permitted for anyone, and Bob's attempt fails. Of course, you can turn off not only a camera but also autoplay (useful when you are showing some ads from 3rd party vendors), microphone and very much more. If you don't want to turn it off for all, you can allow to use it only for code from your domain.
Can I use?
Partially supported by most of the browsers and not supported by the IE.
Feature-Policy: geolocation 'none'
Disabling other sensitive features:
Feature-Policy: camera 'none'; microphone 'none'; geolocation 'none'; autoplay 'none'; display-capture 'none'; payment 'none'
Check mdn for the full list of the available features.
This is a very simple header for those who use HTTPS. It tells the browser to use an only HTTPS connection, even if the user is trying to use HTTP.
Let's imaging that Alice is sitting in a public place and use public WiFi. Evil Bob is sitting not very far from her and trying to sniff all non-encrypted traffic. Alice decides to visit some online-shop and uses an old and good link like www://my-example-shop.com. Evil Bob sees her request (it's not encrypted) and starts recording Alice's activity hoping to get credit card information. But, after the first request, the shop returns STS header:
Strict-Transport-Security: max-age=31536000. And browsers automatically redirects Alice to the HTTPS version of the page. From now, Evil Bob sees only encrypted traffic and can't steal anything.
Can I use?
Supported by all browsers except Opera Mini. And Yes, IE also supports this header.
Strict-Transport-Security: max-age=31536000; includeSubDomains
Controls how much of the referrer information (host, query params, etc) are sent within the request.
Alice has a forum about cats with lots of links to other resources. When a user clicks on the link, he is navigated to another web page, and this web page can gather some information about the source of the navigation. You value the privacy of your users and want to keep this information secret. You set referrer-Policy header and deny browser to send referrer information for all except your self.
Can I use?
Mostly Supported with all (IE — partially) browsers except Opera Mini
Showing referrer info only for the origin:
As far as I use .NET, here is the result setup for web.config: (note, unsafe js inline is not supported):
<customHeaders> <add name="Content-Security-Policy" value="default-src 'none'; img-src 'self'; font-src 'self'; connect-src 'self' https://my-example-api.ua; script-src 'self'; style-src 'self' 'unsafe-inline'; frame-ancestors 'none'" /> <add name="Feature-Policy" value="camera 'none'; microphone 'none'; geolocation 'none'; autoplay 'none'; display-capture 'none'; payment 'none'" /> <add name="X-Content-Type-Options" value="nosniff"/> <add name="Referrer-Policy" value="same-origin"/> <add name="Strict-Transport-Security" value="max-age=31536000"/> </customHeaders>
- CSP Cheat Sheet
- Using Feature-Policy
Bonus: web.config with all set headers can be found here
Stay safe and don't forget to remove x-powered header! :)
[Thanks to John Salvino for the photo]
Author's blog: http://drag13.io/