Mercurial > hg-stable
comparison mercurial/help/config.txt @ 30766:d7bf7d2bd5ab
hgweb: support Content Security Policy
Content-Security-Policy (CSP) is a web security feature that allows
servers to declare what loaded content is allowed to do. For example,
a policy can prevent loading of images, JavaScript, CSS, etc unless
the source of that content is whitelisted (by hostname, URI scheme,
hashes of content, etc). It's a nifty security feature that provides
extra mitigation against some attacks, notably XSS.
Mitigation against these attacks is important for Mercurial because
hgweb renders repository data, which is commonly untrusted. While we
make attempts to escape things, etc, there's the possibility that
malicious data could be injected into the site content. If this happens
today, the full power of the web browser is available to that
malicious content. A restrictive CSP policy (defined by the server
operator and sent in an HTTP header which is outside the control of
malicious content), could restrict browser capabilities and mitigate
security problems posed by malicious data.
CSP works by emitting an HTTP header declaring the policy that browsers
should apply. Ideally, this header would be emitted by a layer above
Mercurial (likely the HTTP server doing the WSGI "proxying"). This
works for some CSP policies, but not all.
For example, policies to allow inline JavaScript may require setting
a "nonce" attribute on <script>. This attribute value must be unique
and non-guessable. And, the value must be present in the HTTP header
and the HTML body. This means that coordinating the value between
Mercurial and another HTTP server could be difficult: it is much
easier to generate and emit the nonce in a central location.
This commit introduces support for emitting a
Content-Security-Policy header from hgweb. A config option defines
the header value. If present, the header is emitted. A special
"%nonce%" syntax in the value triggers generation of a nonce and
inclusion in <script> elements in templates. The inclusion of a
nonce does not occur unless "%nonce%" is present. This makes this
commit completely backwards compatible and the feature opt-in.
The nonce is a type 4 UUID, which is the flavor that is randomly
generated. It has 122 random bits, which should be plenty to satisfy
the guarantees of a nonce.
author | Gregory Szorc <gregory.szorc@gmail.com> |
---|---|
date | Tue, 10 Jan 2017 23:37:08 -0800 |
parents | e75463e3179f |
children | 354020079723 |
comparison
equal
deleted
inserted
replaced
30765:eb7de21b15be | 30766:d7bf7d2bd5ab |
---|---|
2109 | 2109 |
2110 ``contact`` | 2110 ``contact`` |
2111 Name or email address of the person in charge of the repository. | 2111 Name or email address of the person in charge of the repository. |
2112 (default: ui.username or ``$EMAIL`` or "unknown" if unset or empty) | 2112 (default: ui.username or ``$EMAIL`` or "unknown" if unset or empty) |
2113 | 2113 |
2114 ``csp`` | |
2115 Send a ``Content-Security-Policy`` HTTP header with this value. | |
2116 | |
2117 The value may contain a special string ``%nonce%``, which will be replaced | |
2118 by a randomly-generated one-time use value. If the value contains | |
2119 ``%nonce%``, ``web.cache`` will be disabled, as caching undermines the | |
2120 one-time property of the nonce. This nonce will also be inserted into | |
2121 ``<script>`` elements containing inline JavaScript. | |
2122 | |
2123 Note: lots of HTML content sent by the server is derived from repository | |
2124 data. Please consider the potential for malicious repository data to | |
2125 "inject" itself into generated HTML content as part of your security | |
2126 threat model. | |
2127 | |
2114 ``deny_push`` | 2128 ``deny_push`` |
2115 Whether to deny pushing to the repository. If empty or not set, | 2129 Whether to deny pushing to the repository. If empty or not set, |
2116 push is not denied. If the special value ``*``, all remote users are | 2130 push is not denied. If the special value ``*``, all remote users are |
2117 denied push. Otherwise, unauthenticated users are all denied, and | 2131 denied push. Otherwise, unauthenticated users are all denied, and |
2118 any authenticated user name present in this list is also denied. The | 2132 any authenticated user name present in this list is also denied. The |