Content Security Policy是一种网页安全策略
,现代浏览器使用它来增强网页的内容安全性。可以通过Content Security Policy来限制哪些资源(如JavaScript、策略CSS
、详解图像等)可以被加载,安安全从哪些url加载
。内容 CSP 本质上是策略白名单机制,开发者明确告诉浏览器哪些外部资源可以加载和执行 ,源码库详解可以从哪些url加载资源
。安安全 CSP最初被设计用来减少跨站点脚本攻击(XSS),内容该规范的策略后续版本还可以防止其他形式的攻击 ,如点击劫持
。详解 启用CSP的方法有两种 ,第一种是内容通过设置一个HTTP响应头(HTTP response header) “Content-Security-Policy”,建站模板第二种是策略通过HTML标签<meta>设置,例如: 除了Content-Security-Policy外 ,还有一个Content-Security-Policy-Report-Only字段,表示不执行限制选项,只是记录违反限制的行为,必须与report-uri值选项配合使用,例如: Content-Security-Policy值由一个或多个指令组成
,多个指令用分号分隔
。模板下载 上述指令对应的值如下
: Source Value Example Description img-src Wildcard, allows any URL except data: blob: filesystem: schemes. none object-src none Prevents loading resources from any source. self script-src self Allows loading resources from the same origin (same scheme, host and port). data: img-src self data: Allows loading resources via the data scheme (eg Base64 encoded images). domain.example.com img-src domain.example.com Allows loading resources from the specified domain name. *.example.com img-src *.example.com Allows loading resources from any subdomain under example.com. https://cdn.com img-src https://cdn.com Allows loading resources only over HTTPS matching the given domain. https: img-src https: Allows loading resources only over HTTPS on any domain. unsafe-inline script-src unsafe-inline Allows use of inline source elements such as style attribute, onclick, or script tag bodies (depends on the context of the source it is applied to) and javascript: URIs unsafe-eval script-src unsafe-eval Allows unsafe dynamic code evaluation such as JavaScript eval() sha256- script-src sha256-xyz... Allows an inline script or CSS to execute if its hash matches the specified hash in the header. Currently supports SHA256, SHA384 or SHA512. CSP Level 2 nonce- script-src nonce-rAnd0m Allows an inline script or CSS to execute if the script (eg: <script nonce="rAnd0m">) tag contains a nonce attribute matching the nonce specifed in the CSP header. The nonce should be a secure random string, and should not be reused. CSP Level 2 strict-dynamic script-src strict-dynamic Enables an allowed script to load additional scripts via non-"parser-inserted" script elements (for example document.createElement(script); is allowed). CSP Level 3 unsafe-hashes script-src unsafe-hashes sha256-abc... Allows you to enable scripts in event handlers (eg onclick). Does not apply to javascript: or inline <script> CSP Level 3 复制frame-ancestors
:限制嵌入框架的网页 base-uri:限制 复制block-all-mixed-content:HTTPS 网页不得加载HTTP链接的资源 upgrade-insecure-requests:自动将网页加载的源码下载外部资源的链接由HTTP改为HTTPS plugin-types:限制可以使用的插件格式 CSP对于保护Web应用程序的安全非常重要
,可以帮助减少很多XSS类攻击。需要注意的是,亿华云CSP只是一种安全策略,不能完全保证网站的安全性。因此,在使用CSP时,还需要结合其他安全措施,如使用HTTPS、防火墙等 ,进一步提高网站的安全性。免费模板
什么是安安全Content Security Policy(CSP)
启用CSP的安安全两种方法
CSP指令介绍
小结