SecurityEngineering/CSP Radar: Difference between revisions
Jump to navigation
Jump to search
m (Sidstamm moved page SecurityEngineering/CSP to SecurityEngineering/CSP Radar: better name) |
|||
Line 1: | Line 1: | ||
= CSP: the Future™ = | = CSP: the Future™ = | ||
* 1.0 support is in Fx23 which will go to | * 1.0 support is in Fx23 which will go to Release on August 6, 2013 | ||
* dependencies for https://bugzilla.mozilla.org/show_bug.cgi?id=663566 | * bugs that affect CSP 1.0 support should be dependencies for https://bugzilla.mozilla.org/show_bug.cgi?id=663566 | ||
= Bugs = | = Bugs = | ||
* P0 - (CSP 1.0) update docs (q3 goal) - https://bugzilla.mozilla.org/show_bug.cgi?id=837682 (assign=imelven) | * P0 - (CSP 1.0) update docs (q3 goal) - https://bugzilla.mozilla.org/show_bug.cgi?id=837682 (assign=imelven) |
Revision as of 01:19, 29 June 2013
CSP: the Future™
- 1.0 support is in Fx23 which will go to Release on August 6, 2013
- bugs that affect CSP 1.0 support should be dependencies for https://bugzilla.mozilla.org/show_bug.cgi?id=663566
Bugs
- P0 - (CSP 1.0) update docs (q3 goal) - https://bugzilla.mozilla.org/show_bug.cgi?id=837682 (assign=imelven)
- P0 - CSP 1.0 turned on for Firefox OS - need to do try run and see if there's work to do here - https://bugzilla.mozilla.org/show_bug.cgi?id=858787 (assign=grobinson)
- P1 CSP 1.0 policy without default-src should assume 'default-src *' (bug 764937 and 780978 [remove makeExplicit]) - almost ready to land (assign=sid)
- P1 CSP 1.0 turned on for Fennec - this is just flipping the switch, but needs a try run - https://bugzilla.mozilla.org/show_bug.cgi?id=858780 (assign=grobinson)
- P1 (CSP 1.0) A policy of like script-src 'self' 'unsafe-inline'; allows eval but should not https://bugzilla.mozilla.org/show_bug.cgi?id=882060 (assign=sid)
- P1 - (CSP 1.0) CSP should not block inline scripts or evail unless script-src or default-src are included - https://bugzilla.mozilla.org/show_bug.cgi?id=885433 (assign=grobinson)
- P2 - (CSP 1.0) report destination loosening - https://bugzilla.mozilla.org/show_bug.cgi?id=843311 - helps adoption but isn't crucial
- P2 - (CSP 1.0) EventSource needs to be restricted using connect-src directive https://bugzilla.mozilla.org/show_bug.cgi?id=802872
- P2 - (CSP 1.0) Verify that content added by XSLT stylesheet is subject to document's CSP - https://bugzilla.mozilla.org/show_bug.cgi?id=663567
- P2 - redirects / nsIContentPolicy - test cases involving redirects fail for some reason
- P2 - (CSP 1.1) - script-nonce (helps with adoption) - land behind a pref ?
- P2 - improve error messages/logging - https://bugzilla.mozilla.org/show_bug.cgi?id=607067 https://bugzilla.mozilla.org/show_bug.cgi?id=792161
- P3 (spec unclear?) Content Security Policy (CSP) blocks SVG embedded as data URI in CSS url() (affects b2g) https://bugzilla.mozilla.org/show_bug.cgi?id=878608
- P3 - fix bookmarklets to work with CSP - https://bugzilla.mozilla.org/show_bug.cgi?id=866522
- P3 - (CSP 1.1) https://bugzilla.mozilla.org/show_bug.cgi?id=826805 - allow HTTPS content when an http source is present (in 1.1 spec)
- P3 - (CSP 1.1) meta support - many issues to resolve - https://bugzilla.mozilla.org/show_bug.cgi?id=663570
- P3 - (CSP 1.1) paths - https://bugzilla.mozilla.org/show_bug.cgi?id=808292
- P3 - C++ rewrite
- P3 - sandbox (depends on iframe sandbox work that isn't complete (needs allow-popups, bug 785310) - https://bugzilla.mozilla.org/show_bug.cgi?id=671389
- P4 (not in spec) block CSSOM calls without style-src: unsafe-eval https://bugzilla.mozilla.org/show_bug.cgi?id=873302 - needs proposal and discussion on the WG list
- P4 - (CSP 1.0) eval bypass using crypto.generateCRMFRequest https://bugzilla.mozilla.org/show_bug.cgi?id=824652 - can already run script in this case
- P4 (spec under development still) - frame options https://bugzilla.mozilla.org/show_bug.cgi?id=846978 (have existing frame-ancestors, going to fix X-Frame-Options - https://bugzilla.mozilla.org/show_bug.cgi?id=725490)
- P? - (non CSP spec) - script-hash ?
Issues
- should inline scripts/eval be blocked if neither script-src or default-src are present ?
- this is so you can do e.g. csp sandbox or frame-options without blocking scripts
- adam's view is that if you don't opt into script restrictions by specifying default-src or script-src scripts shouldn't be blocked
- filed https://bugzilla.mozilla.org/show_bug.cgi?id=885433
- script-nonce / script-hash (CSP 1.1)
- paths (CSP 1.1)
- sandbox (options 1.0, in csp1.1)
- anything else from CSP 1.1 or UI Safety specs ?
- frame-options (pretty much == frame-ancestors)
- redirects / general nsIContentPolicy issue ?
ACTIONS
- figure out if W3C test suite failures are legit - file bugs for the failures that are
- Brad Hill test suite: http://webappsec-test.info/web-platform-tests/CSP/
- needs confirmation - Bug in Content Security Policy for setInterval and setTimeout when argument is a function - https://bugzilla.mozilla.org/show_bug.cgi?id=699586
- needs confirmation - Verify that content added by XSLT stylesheet is subject to document's CSP - https://bugzilla.mozilla.org/show_bug.cgi?id=663567