Hi,

good point! The settings I suggested were only a hint how to implement the 
security related topics of Mozillas Observatory into Wicket. The settings of 
course should be adjusted to the requirements of the web page. :-)

kind regards

Tobias

> Am 29.08.2016 um 08:41 schrieb Martin Spielmann 
> <martin.spielm...@pingunaut.com>:
> 
> Hi,
> thanks a lot!
> Be careful with the "x-frame-options=deny". It will break ajax file uploads 
> within your applications (which are implemented using an iframe). You could 
> set it to "sameorigin" to make ajax file uploads work again, but I didn't 
> have the chance to test if this changes the ranking in mozillas test.
> 
> Regards,
> Martin
> 
> Am 28. August 2016 23:57:30 MESZ, schrieb Carl-Eric Menzel 
> <cmen...@wicketbuch.de>:
>> Hi Tobias,
>> 
>> thanks for collecting the headers, that saves me the effort :-) I know
>> it's easy to write, I was just suggesting we add something like this to
>> Wicket itself. I'll see whether I can come up with something simple and
>> flexible enough.
>> 
>> One question: Why onEndRequest?
>> 
>> Carl-Eric
>> 
>> On Sun, 28 Aug 2016 15:52:32 +0200
>> Tobias Soloschenko <tobiassolosche...@googlemail.com> wrote:
>> 
>>> Hi,
>>> 
>>> you are able to implement the security headers in a very easy way.
>>> See:
>>> 
>>> Mozilla tool to check web security: https://observatory.mozilla.org/
>>> 
>>> Demo wicket application (might be down or change after a while): 
>>> https://wicketsecurity-klopfdreh.rhcloud.com/
>>> 
>>> The test:
>> https://observatory.mozilla.org/analyze.html?host=wicketsecurity-klopfdreh.rhcloud.com
>>> 
>>> The implementation within your Wicket Application:
>>> 
>>>     @Override
>>>     protected void init()
>>>     {
>>>         super.init();
>>> 
>>>         getRequestCycleListeners().add(new
>>> AbstractRequestCycleListener(){ @Override
>>>             public void onEndRequest(RequestCycle cycle)
>>>             {
>>> ((WebResponse)cycle.getResponse()).setHeader("X-XSS-Protection", "1; 
>>> mode=block");
>> ((WebResponse)cycle.getResponse()).setHeader("Strict-Transport-Security",
>>> "max-age=31536000; includeSubDomains; preload");
>> ((WebResponse)cycle.getResponse()).setHeader("X-Content-Type-Options", 
>>> "nosniff");
>>> ((WebResponse)cycle.getResponse()).setHeader("X-Frame-Options",
>>> "DENY");
>> ((WebResponse)cycle.getResponse()).setHeader("Content-Security-Policy",
>>> "default-src https:"); // Google "for Content-Security-Policy" to
>>> allow more domains }
>>>         });
>>>     }
>>> 
>>> The result: >> A- << (because of redirection settings of tomcat - I
>>> was not able to change them that fast)
>>> 
>>> To get A just enable a server redirect like mentioned here:
>> https://wiki.mozilla.org/Security/Guidelines/Web_Security#HTTP_Redirections
>>> 
>>> kind regards
>>> 
>>> Tobias
>>> 
>>>> Am 28.08.16 um 10:28 schrieb Carl-Eric Menzel:
>>>> I think it would be a good idea to have something like this as an
>>>> option in Wicket. Something to turn on with a one-liner for the
>>>> application. There are a bunch of these headers that are useful,
>>>> plus I recently came across this:
>>>> 
>>>> https://dev.to/ben/the-targetblank-vulnerability-by-example
>>>> 
>>>> Should we perhaps also add something that adds the rel="noopener"
>>>> attribute to links with target="_blank"?
>>>> 
>>>> I'm all for making these security things as easy as possible for
>> the
>>>> developer.
>>>> 
>>>> Carl-Eric
>>>> 
>>>> On Sat, 27 Aug 2016 18:08:36 +0200
>>>> Martin Grigorov <mgrigo...@apache.org> wrote:
>>>> 
>>>>> Hi,
>>>>> 
>>>>> We use Spring Security in all our applications.
>>>>> It adds these response headers for free.
>>>>> 
>>>>> Any other Servlet Filter could do the same but I don't mind adding
>>>>> facilities in Wicket too.
>>>>> 
>>>>> Btw one of the security experts from OWASP audited our
>> applications
>>>>> in the last few weeks. Although he've found few problems here and
>>>>> there he said very nice words for Wicket!
>>>>> 
>>>>> Martin Grigorov
>>>>> Wicket Training and Consulting
>>>>> https://twitter.com/mtgrigorov
>>>>> 
>>>>> On Sat, Aug 27, 2016 at 6:01 PM, Tobias Soloschenko <  
>>>>> tobiassolosche...@googlemail.com> wrote:  
>>>>> 
>>>>>> Hi,
>>>>>> 
>>>>>> Mozilla just made a tool public which allows to scan websites for
>>>>>> security risks. Maybe we can somehow add a default set of headers
>>>>>> to the page rendering of Wicket / apply other security relevant
>>>>>> implementations. Or we are able to make them at least optional:
>>>>>> 
>>>>>> https://observatory.mozilla.org
>>>>>> 
>>>>>> Example header:
>> https://wiki.mozilla.org/Security/Guidelines/Web_Security#X-XSS-Protection
>>>>>> 
>>>>>> What so you think about that idea?
>>>>>> 
>>>>>> kind regards
>>>>>> 
>>>>>> Tobias  
> 
> -- 
> Diese Nachricht wurde von meinem Android-Mobiltelefon mit K-9 Mail gesendet.

Reply via email to