, not Attack ◦ in policy has a hole, It may have incident ◦ no implement of CSP on old browser • do Security thing, and adding CSP for cover ◦ if security hall exists, block the attack 17
WHAT happened ◦ document uri ◦ violated policy • you can’t know WHY happened ◦ attack ? or not ? • you can’t know WHAT result to USER ◦ ad image not displayed ? ◦ can’t read the article ? 21
your policy right ◦ crowring with browser on staging • Real World Problems ◦ every user use each browser with variaus setting • Deploy in production immediately ? ◦ bad experience for user ? ◦ it’s wose than blocking attack ? 23
only • rolling out to remove report-only ◦ after finish testing policy ◦ but I think it’s optional ◦ finding what happened is enought for integration 24
extentions, localproxy etc ◦ user nomary arrange contents by themself • Almost all seems Not Attack ◦ really need to block them ? ◦ safe ? incombenience ? • Protected / Clippled ◦ depends for contents ◦ Github / Twitter etc
in HTTPS ◦ can’t ensure falsify by MITM ◦ no green URL bar • Active ◦ Possible to modify outer DOM (script, iframe etc) ◦ Blocked • Passive ◦ Impossible to modify outer DOM (img, video, audio etc) ◦ Error but not blocked
if not supported ◦ never mixed contents • avoid mixed only one header ◦ no modify contents ◦ find mixed by 404 in server access.log Content-Security-Policy: Upgrade-Insecure-Requests
◦ bad response at sending Report ◦ can’t see data before half year ◦ can’t see HTTP header ◦ can’t export your data • do yourself ◦ simple POST endpoint for JSON ◦ kibana, grafana, big query etc ◦ Google Analytics support are welcome :)