Mozilla Content Security Policy

Bug reports and enhancement requests
Post Reply
User avatar
Foam Head
Senior Member
Posts: 57
Joined: Sun May 03, 2009 5:35 pm

Mozilla Content Security Policy

Post by Foam Head »

It looks like Mozilla is actively working towards putting some XSS, CSRF, and click-jacking protections into their browsers. Their Content Security Policy seems reasonably detailed and is targeted to incorporate at least some of the protections that NoScript offers. Since CSP is optional and can be implemented via HTML meta tags that can be spoofed on a compromised site, I don't see NoScript going away any time soon. However I have to ask: Giorgio, are you involved with CSP in any official capacity? And do you think CSP is going in the right direction or is it simply a misstep that will further cloud the already foggy browser security landscape?

Thanks,
-Foam
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.11) Gecko/2009060215 Firefox/3.0.11 (.NET CLR 3.5.30729)
User avatar
therube
Ambassador
Posts: 7969
Joined: Thu Mar 19, 2009 4:17 pm
Location: Maryland USA

Re: Mozilla Content Security Policy

Post by therube »

Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.19) Gecko/20110420 SeaMonkey/2.0.14 Pinball NoScript FlashGot AdblockPlus
Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.22) Gecko/20090605 SeaMonkey/1.1.17
User avatar
Giorgio Maone
Site Admin
Posts: 9524
Joined: Wed Mar 18, 2009 11:22 pm
Location: Palermo - Italy
Contact:

Re: Mozilla Content Security Policy

Post by Giorgio Maone »

Foam Head wrote:Giorgio, are you involved with CSP in any official capacity?
I've been asked for advice by Brandon Sterne, the CSP lead at Mozilla, in the early CSP design stages (when it was still called SSP), and I'm still indirectly involved as a member of the Mozilla Security Group.
Foam Head wrote:And do you think CSP is going in the right direction or is it simply a misstep that will further cloud the already foggy browser security landscape?
I do not think it's a misstep at all. It would be great if it got wide adoption on the client, and especially on the server side (the two are strictly interdependent, obviously).
Notice, though, that its scope is very limited: while it's a great answer to XSS if correctly implemented on the server side (which is unlikely to be done better than current "secure development" best practices, except for larger sites with very good IT staffers), its merits against clickjacking are unlikely and it can't do anything against CSRF: that's why NoScript, ClearClick and ABE are orthogonal to CSP, rather than a competitors.
Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1) Gecko/20090624 Firefox/3.5 (.NET CLR 3.5.30729)
Post Reply