Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide a default Content Security Policy (CSP) that is lenient yet secure #24961

Closed
wants to merge 1 commit into from
Closed

Provide a default Content Security Policy (CSP) that is lenient yet secure #24961

wants to merge 1 commit into from

Conversation

oreoshake
Copy link
Contributor

@oreoshake oreoshake commented May 10, 2016

Summary

This is not a new idea, "Add Content Security Policy(CSP)" has been proposed but seems to be stuck in analysis paralysis. Perfect being the enemy good, here's an alternate proposal solving a slightly different problem. Rather than a general solution, this PR proposes a generic CSP that may work for most applications.

Building on the concept of default_headers, it would be great if CSP was applied by default. This is mostly geared towards new applications. Unfortunately, making this "report only" will generate a warning in the console since the policy, understandably, lacks a report-uri value. Adding a default report-uri realistically would require adding a CSP reporting endpoint to rails by default. Perhaps it could use the middleware @xuchu provided.

Because of these factors, applying the potentially breaking header probably better suited as part of a generator script for new applications but I don't know the cleanest way of accomplishing this.

In past lives (e.g. Twitter scala applications), applying CSP by default had amazing returns. CSP adoption and awareness went from "wat"/"meh" to "this is useful". The suggested policy should work for most applications and the browser console literally tells you what modifications need to be made. Brand new applications do not produce any violations. Adding code that violates this policy could be caught early on and people can choose to work within the suggested boundaries or they can decide to modify the policy. Naturally, there will be those who disable the policy entirely. That is entirely up to them but at least some thought will be put into it.

This is a bit contentious, of course.

Other Information

Needs tests, but I wanted to wait for a better integration point before I write tests I know I'm going to throw away.

An Introduction to Content Security Policy
GitHub's CSP Journey

Thanks for contributing to Rails!

No, no, no. Thank you Rails!

Building on the concept of default headers, it would be great if CSP was applied by default. This is mostly geared towards new applications. Unfortunately, making this "report only" will generate a warning in the console since the policy, understandably, lacks a report-uri value. Adding a default report-uri realistically would require adding a CSP reporting endpoint to rails by default. Because of these factors, applying the potentially breaking header probably better suited as part of a generator script for new applications but I don't know the cleanest way of accomplishing this.

In past lives (e.g. Twitter scala applications), applying CSP by default had amazing returns. The suggested policy should work for most applications and the browser console literally tells you what modifications need to be made. Adding code that violates this policy could be caught early on and people can choose to work within the suggested boundaries or they can decide to modify the policy. Naturally, there will be those who disable the policy entirely. That is entirely up to them but at least some thought will be put into it.

This is a bit contentious, of course.
@rails-bot
Copy link

Thanks for the pull request, and welcome! The Rails team is excited to review your changes, and you should hear from @sgrif (or someone else) soon.

If any changes to this PR are deemed necessary, please add them as extra commits. This ensures that the reviewer can see what has changed since they last reviewed the code. Due to the way GitHub handles out-of-date commits, this should also make it reasonably obvious what issues have or haven't been addressed. Large or tricky changes may require several passes of review and changes.

Please see the contribution instructions for more information.

@sgrif
Copy link
Contributor

sgrif commented May 10, 2016

r? @rafaelfranca

@rails-bot rails-bot assigned rafaelfranca and unassigned sgrif May 10, 2016
@rafaelfranca
Copy link
Member

@sgrif lol. I was about to assign to me.

I like the idea and I agree we should not aim perfection. I'll review it.

@sgrif
Copy link
Contributor

sgrif commented May 10, 2016

@rafaelfranca I'm in your head. ;)

👍 on this proposal from me FWIW

@maclover7
Copy link
Contributor

maclover7 commented May 10, 2016

Can you add some documentation explaining CSP? Also, we should probably have an option to disable this.

@oreoshake
Copy link
Contributor Author

@maclover7 glad to. However, I'd prefer to hold off until we know where the application will end up as there may be different context available. e.g. an explanation in the default_headers context may be entirely different than where it lives in a generator. For now, I hope that the "Other Information" section will suffice for the purposes of moving this PR along.

@maclover7
Copy link
Contributor

👍

My recommendation is that we stick the CSP config in config/environments/*.rb, or in an initializer. If this/when this ships, there should definitely be a big red off button, in case people don't want it 😬 (opt-out, not opt-in -- Rails is providing good security protection here 😄)

@vipulnsward
Copy link
Member

@maclover7 this can be achieved by removing the header, by specifying a custom one on config.action_dispatch.default_headers. AFAIK, this doesn't need to live in another config, just like XSS-Protection or Frame-Options are our default, and not as options.

@oreoshake
Copy link
Contributor Author

oreoshake commented May 10, 2016

@vipulnsward I think making this a default header is probably a bad idea since it will break any application using risky behaviors. It should only be a default for newly generated applications.

Although, introducing this as a breaking change for the next major version is an interesting idea...

@maclover7
Copy link
Contributor

maclover7 commented May 10, 2016

@oreoshake Unfortunately, the "breaking change boat" for 5.0 has left the dock, and we are in the feature freeze right for 5.0 (so no breaking changes 😢)

@vipulnsward I was more asking about whether, for example, we could have a nice API for configuring the font-src or script-src (or whatever) for end users through another application configuration option. Providing a hash of defaults is super helpful (and an awesome baseline of security protection for end users), but we have to provide (and document of course 😉) a nice way to change things around too (and an opt-out route too) 😬

@oreoshake
Copy link
Contributor Author

@oreoshake Unfortunately, the "breaking change boat" for 5.0 has left the dock, and we are in the feature freeze right for 5.0 (so no breaking changes 😢)

Yeah, that's what I figured. But rails 6.0 will be a thing! Maybe then it could be a default_header? But for the sake of not spamming this issue, that's the last I'll mention this idea 😸

@rafaelfranca
Copy link
Member

@maclover7 @vipulnsward I recommend you to check #15777.

@rafaelfranca
Copy link
Member

@chancancode @kaspth @jeremy mind to take a look in the idea? I'm positive to it as new default in generated applications.

@nateberkopec
Copy link
Contributor

I don't think this moves forward on @chancancode's objection to the previous CSP PR (which I agree with):

Regarding the API, I think application wide config.*is the wrong direction. Unlike HSTS which is a domain policy, CSP is a content policy. It could vary on different parts of your app and should differ for the content type.

Also second @maclover7 in that this particular PR's approach would be far too difficult to modify or turn off.

Spitballing

IMO the ideal API looks more like how CSRF protection works today - it should live in ApplicationController, and have a scary-ish name that makes it clear that "if you comment this out, you are Doing Something Dangerous!" It should also use a Hash-based API for easy modification of just a few settings.

class ApplicationController < ActionController::Base
  protect_from_forgery with: :exception

  private

  # Rails takes care of transforming this into a CSP policy string
  def content_security_policy
    {
      "default-src": %w[self https],
      "font-src": %w[self https data],
      "img-src": %w[self https data],
      "object-src": %w[none],
      "script-src": %w[self https],
      "style-src": %w[self https unsafe-inline]
    }
  end
end

class MyInsecureController < ApplicationController

  private

  def content_security_policy
    {
      "default-src": %w[self]
    }
  end
end

class MyControllerWithAdditionalTrustedOrigin < ApplicationController

  private

  # Append a trusted origin to all directives, not sure if this actually works but you get the idea
  def content_security_policy
    policy = super

    policy.each_with_object({}) do |memo, (k,ary)|
      ary << "*.mytrustedorigin.com"
      memo[k] = ary
    end
  end
end

content_security_policy should probably be an empty Hash by default, to make this backwards-compatible and only something added to newly generated Rails apps.

@jeremy
Copy link
Member

jeremy commented May 21, 2016

I agree with the motivation and I'm sympathetic to the perfection-as-enemy-of-the-good perspective, but this is an arena that deserves a pretty high bar to introduce an important, far-reaching new concept to Rails users.

The approach is clear: per-resource policy. We're blocked on implementation interest & effort. Really, the major push is documentation and communication. Per-controller declarative policy is straightforward to implement in comparison to writing up a fantastic CSP guide.

#15777 has the essential implementation in place. It needs documentation and implementation polish, and default policy guidance for new apps.

@connorshea
Copy link
Contributor

connorshea commented Oct 10, 2016

@jeremy I'd be happy to help out with the Content Security Policy guide if we're still willing to go forward with #15777. I've made a (admittedly non-comprehensive) CSP writeup when I pitched the addition of CSP headers for GitLab.

While the initial attempt to add the headers ran into some roadblocks I still fully intend to ship it in the next few months. Between us and the fantastic information GitHub, Twitter, and Dropbox have published about their experiences with CSP I'm sure we can put something very useful together :)

@kaspth
Copy link
Contributor

kaspth commented Oct 28, 2016

@connorshea we need someone to kickstart a guide to move forward with #15777 — you seem like just the guy to do it! I skimmed your referenced write up, it seems like a fine place to open a pull request and discuss further. Do take a stab at it! ❤️

Between us and the fantastic information GitHub, Twitter, and Dropbox have published about their experiences with CSP I'm sure we can put something very useful together :)

Concurred 🤘

@connorshea
Copy link
Contributor

@kaspth Should I make a PR on top of #15777 or have it be separate?

@nateberkopec
Copy link
Contributor

@connorshea happy to help with any revision/proofreading on that

@kaspth
Copy link
Contributor

kaspth commented Oct 31, 2016

@connorshea let's try it separately. I'll petition the student who worked on the implementation to see if he wants to pick it up again.

@kaspth
Copy link
Contributor

kaspth commented Jan 2, 2017

@connorshea @nateberkopec 👋, did any of you make some headway on a CSP guide? 😁

@connorshea
Copy link
Contributor

@kaspth unfortunately I haven't had time recently.

@kaspth
Copy link
Contributor

kaspth commented Jan 4, 2017

@connorshea no worries 😉

@bpo
Copy link
Contributor

bpo commented Feb 17, 2017

In #27583 it was proposed to merge secureheaders into core to address this. A few technical details got in the way:

  • secureheaders does not have a very Rails-y API, and is not a great candidate for becoming a part of the core Rails codebase as it stands.
  • secureheaders' license conflicts with the Rails MIT license.
  • Effort was expended in 2014 toward cleanly implementing CSP support within ActionPack.

The first concern was addressed within the issue – @rafaelfranca suggested that the secureheaders gem become a part of the rails project, and generate the application with a call to that gem and a new initializer.

@oreoshake was nice enough to do the legwork to get secureheaders re-licensed under MIT, addressing the second concern.

As for the last concern, the effort in #15777 is not mutually exclusive with adding secureheaders to Rails. It may unstick this 2+ year process if the API (and docs) are developed alongside the other best-practices for security provided by secureheaders (HPKP, XFO, etc).

As it stands, someone who wants to secure a new Rails app should use secureheaders today – so why not make that the default starting point?

(I'd like to help with this if it seems like a reasonable approach.)

@kaspth
Copy link
Contributor

kaspth commented Dec 3, 2017

Superseded by #31162

Thanks for the PR! ❤️

@kaspth kaspth closed this Dec 3, 2017
@oreoshake
Copy link
Contributor Author

I have never been happier to see a PR of mine get closed unmerged 😄

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.