blob: 236b367faceb69810fd26ac780b4bab72051f06a [file] [log] [blame]
Ed Tanous52cc1122020-07-18 13:51:21 -07001#pragma once
2
Ed Tanous3ccb3ad2023-01-13 17:40:03 -08003#include "bmcweb_config.h"
Ed Tanous2205bbf2021-06-17 13:33:47 -07004
Ed Tanous3ccb3ad2023-01-13 17:40:03 -08005#include "http_request.hpp"
6#include "http_response.hpp"
Ed Tanous52cc1122020-07-18 13:51:21 -07007
Ed Tanous0260d9d2021-02-07 19:31:07 +00008inline void addSecurityHeaders(const crow::Request& req [[maybe_unused]],
9 crow::Response& res)
Ed Tanous52cc1122020-07-18 13:51:21 -070010{
11 /*
12 TODO(ed) these should really check content types. for example,
Ed Tanousd8139c62023-06-14 17:11:47 -070013 X-Content-Type-Options header doesn't make sense when retrieving a JSON or
Ed Tanous52cc1122020-07-18 13:51:21 -070014 javascript file. It doesn't hurt anything, it's just ugly.
15 */
16 using bf = boost::beast::http::field;
Ed Tanous52cc1122020-07-18 13:51:21 -070017
Joseph Reynolds1d9502b2023-05-12 10:47:30 -050018 // Recommendations from https://owasp.org/www-project-secure-headers/
19 // https://owasp.org/www-project-secure-headers/ci/headers_add.json
Ed Tanousd8139c62023-06-14 17:11:47 -070020 res.addHeader(bf::strict_transport_security, "max-age=31536000; "
21 "includeSubdomains");
22 res.addHeader(bf::x_frame_options, "DENY");
23
24 res.addHeader(bf::pragma, "no-cache");
25 res.addHeader(bf::cache_control, "no-store, max-age=0");
26
27 res.addHeader("X-Content-Type-Options", "nosniff");
28
Joseph Reynolds1d9502b2023-05-12 10:47:30 -050029 res.addHeader("Referrer-Policy", "no-referrer");
Ed Tanousd8139c62023-06-14 17:11:47 -070030 res.addHeader("Permissions-Policy", "accelerometer=(),"
31 "ambient-light-sensor=(),"
32 "autoplay=(),"
33 "battery=(),"
34 "camera=(),"
35 "display-capture=(),"
36 "document-domain=(),"
37 "encrypted-media=(),"
38 "fullscreen=(),"
39 "gamepad=(),"
40 "geolocation=(),"
41 "gyroscope=(),"
42 "layout-animations=(self),"
43 "legacy-image-formats=(self),"
44 "magnetometer=(),"
45 "microphone=(),"
46 "midi=(),"
47 "oversized-images=(self),"
48 "payment=(),"
49 "picture-in-picture=(),"
50 "publickey-credentials-get=(),"
Joseph Reynolds9bdc8b52023-08-16 12:47:32 -050051 "speaker-selection=(),"
Ed Tanousd8139c62023-06-14 17:11:47 -070052 "sync-xhr=(self),"
53 "unoptimized-images=(self),"
54 "unsized-media=(self),"
55 "usb=(),"
56 "screen-wak-lock=(),"
57 "web-share=(),"
58 "xr-spatial-tracking=()");
Ed Tanousd8139c62023-06-14 17:11:47 -070059 res.addHeader("X-Permitted-Cross-Domain-Policies", "none");
Ed Tanousd8139c62023-06-14 17:11:47 -070060 res.addHeader("Cross-Origin-Embedder-Policy", "require-corp");
61 res.addHeader("Cross-Origin-Opener-Policy", "same-origin");
62 res.addHeader("Cross-Origin-Resource-Policy", "same-origin");
Ed Tanouse662eae2022-01-25 10:39:19 -080063 if (bmcwebInsecureDisableXssPrevention == 0)
Ed Tanous0260d9d2021-02-07 19:31:07 +000064 {
65 res.addHeader("Content-Security-Policy", "default-src 'none'; "
66 "img-src 'self' data:; "
67 "font-src 'self'; "
68 "style-src 'self'; "
69 "script-src 'self'; "
Basheer Ahmed Muddebihal09e7afd2021-03-17 00:55:57 -070070 "connect-src 'self' wss:; "
71 "form-action 'none'; "
72 "frame-ancestors 'none'; "
Jiaqing Zhao91ac2e52022-03-17 00:18:58 +080073 "object-src 'none'; "
Basheer Ahmed Muddebihal09e7afd2021-03-17 00:55:57 -070074 "base-uri 'none' ");
Ed Tanous0260d9d2021-02-07 19:31:07 +000075 // The KVM currently needs to load images from base64 encoded
76 // strings. img-src 'self' data: is used to allow that.
Basheer Ahmed Muddebihal09e7afd2021-03-17 00:55:57 -070077 // https://stackoverflow.com/questions/18447970/content-security-polic
78 // y-data-not-working-for-base64-images-in-chrome-28
Ed Tanous0260d9d2021-02-07 19:31:07 +000079 }
80 else
81 {
82 // If XSS is disabled, we need to allow loading from addresses other
83 // than self, as the BMC will be hosted elsewhere.
84 res.addHeader("Content-Security-Policy", "default-src 'none'; "
85 "img-src *; "
86 "font-src *; "
87 "style-src *; "
88 "script-src *; "
Basheer Ahmed Muddebihal09e7afd2021-03-17 00:55:57 -070089 "connect-src *; "
90 "form-action *; "
91 "frame-ancestors *; "
Jiaqing Zhao91ac2e52022-03-17 00:18:58 +080092 "object-src *; "
Basheer Ahmed Muddebihal09e7afd2021-03-17 00:55:57 -070093 "base-uri *");
Ed Tanous52cc1122020-07-18 13:51:21 -070094
Ed Tanous26ccae32023-02-16 10:28:44 -080095 std::string_view origin = req.getHeaderValue("Origin");
Ed Tanous0260d9d2021-02-07 19:31:07 +000096 res.addHeader(bf::access_control_allow_origin, origin);
97 res.addHeader(bf::access_control_allow_methods, "GET, "
98 "POST, "
99 "PUT, "
100 "PATCH, "
101 "DELETE");
102 res.addHeader(bf::access_control_allow_credentials, "true");
103 res.addHeader(bf::access_control_allow_headers, "Origin, "
104 "Content-Type, "
105 "Accept, "
106 "Cookie, "
107 "X-XSRF-TOKEN");
108 }
Ed Tanous52cc1122020-07-18 13:51:21 -0700109}