[ 
https://issues.apache.org/jira/browse/OFBIZ-6766?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15058368#comment-15058368
 ] 

Forrest Rae commented on OFBIZ-6766:
------------------------------------

Jacques,

In the spirit of secure by default I'd like to throw my vote in for 
HttpHeaderSecurityFilter being enabled by default moving forward.

hstsEnabled is an absolute must, do this over the other two.  A work around if 
you leverage the mod_ajpproxy setup of Apache server in front of Tomcat, there 
is a really awesome Apache config found in the Better Crypto Guide that enables 
HSTS here: https://bettercrypto.org

blockContentTypeSniffingEnabled would really help in situations where file 
uploads are replayed back to another user's web browser to prevent arbitrary 
HTML and JavaScript being executed in the SAMEORIGIN.  More info: 
http://security.stackexchange.com/questions/12896/does-x-content-type-options-really-prevent-content-sniffing-attacks

Clickjacking can be more severe than you think, and any counter measures you 
can provide would be great for users.

> Secure HTTP headers
> -------------------
>
>                 Key: OFBIZ-6766
>                 URL: https://issues.apache.org/jira/browse/OFBIZ-6766
>             Project: OFBiz
>          Issue Type: Sub-task
>          Components: framework
>    Affects Versions: Trunk
>            Reporter: Jacques Le Roux
>            Assignee: Jacques Le Roux
>             Fix For: Upcoming Branch
>
>
> I have created a wiki page for this 
> https://cwiki.apache.org/confluence/display/OFBIZ/How+to+Secure+HTTP+Headers



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to