SecurityEngineering/CSP Radar: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
m (Sidstamm moved page SecurityEngineering/CSP to SecurityEngineering/CSP Radar: better name)
Line 1: Line 1:
= CSP: the Future™ =
= CSP: the Future™ =
* 1.0 support is in Fx23 which will go to Beta quite soon.
* 1.0 support is in Fx23 which will go to Release on August 6, 2013
* dependencies for https://bugzilla.mozilla.org/show_bug.cgi?id=663566
* bugs that affect CSP 1.0 support should be dependencies for https://bugzilla.mozilla.org/show_bug.cgi?id=663566
 
= Bugs =  
= Bugs =  
* P0 - (CSP 1.0) update docs (q3 goal) - https://bugzilla.mozilla.org/show_bug.cgi?id=837682 (assign=imelven)
* P0 - (CSP 1.0) update docs (q3 goal) - https://bugzilla.mozilla.org/show_bug.cgi?id=837682 (assign=imelven)

Revision as of 01:19, 29 June 2013

CSP: the Future™

Bugs

Issues

  • should inline scripts/eval be blocked if neither script-src or default-src are present ?
    • this is so you can do e.g. csp sandbox or frame-options without blocking scripts
    • adam's view is that if you don't opt into script restrictions by specifying default-src or script-src scripts shouldn't be blocked
    • filed https://bugzilla.mozilla.org/show_bug.cgi?id=885433
  • script-nonce / script-hash (CSP 1.1)
  • paths (CSP 1.1)
  • sandbox (options 1.0, in csp1.1)
  • anything else from CSP 1.1 or UI Safety specs ?
  • frame-options (pretty much == frame-ancestors)
  • redirects / general nsIContentPolicy issue ?

ACTIONS