-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
research/security: what's the most strict CSP that could be applied? #8
Comments
using this browser extension,
|
=> with this one should wait what's the architectural decision of moving from ws to http/2 (see #4 (comment) with SSE and fetch #4 (comment)) and then move on, to find a great balance of highest speed and highest security (or maybe both is fully possible... :-) |
for how important this is:
Securing Web Apps with Modern Platform Features (Google I/O ’19) |
regarding Refactoring inline code (see #8 (comment))
|
just learned inlining resources like js and css has a second disadvantage:
Maybe a) isn't fully relevant because the principle of ts liveview if you inline all resources |
=> with this there are 2 good reasons to externalize code: security and speed/serverload/traffic for returning visitors Does this necessarily lead to speed disadvantage in comparison to inlined code? here is a great sum up of this topic: |
with this learned, from my pov, it should be possible to apply the most strict and with this the most secure csp rules without sacrificing functionality and performance at all :-) basic structure of delivery (via http/2):
too many connection? no, with http/2 the well known connection limit (6 in http/1.1 ) isn't valid any more with this, a strict CSP like this should be possible (rough):
of course not everyone can or / would want to use or / need this kind of CSP, but => What do you think? |
the a since when there is a strange report, it may also be triggered from a browser extension /addon injecting some code.. |
Since ts-liveview already starts to care for XSS-attacks, in https://github.com/beenotung/ts-liveview
the next logical step would be to research, how secure it can get via applying the most possible strict CSP (Content security policy)
At this time in the demo https://liveviews.cc/auto-complete, no CSP is set:
tested with https://cspscanner.com/
As a good start, one may use an automatic generator, which are available for many browsers
e.g. https://addons.mozilla.org/en-US/firefox/addon/laboratory-by-mozilla/
The text was updated successfully, but these errors were encountered: