-
Notifications
You must be signed in to change notification settings - Fork 43
CSP "none" combined with other sources #913
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
See also: https://csplite.com/csp101/ |
Indeed, in version 3 they have more clear/explicit text about it.
and understood that matching |
@gthess: Thanks for your double checking! |
After a discrepancy between specs & implementation of IPv4 parsing I nowadays always check the CSP implementations in Mozilla & Chromium . <head>
<meta http-equiv="Content-Security-Policy" content="default-src 'none' 'self'">
</head> Chromium:
The Mozilla:
The So the main browsers do conform to the spec here (triple check ✔️). |
I think our code may already do this. I can not reproduce the behavior where we the presence of none with other, invalid things, incorrectly approves the policy. Valid: Invalid variations:
|
Agreed that this now works how it should, I will check whether we cover this in the tests. |
I think this was a incorrect and misinterpreted based on testing the code with #810. Anyways, #993 adds both this feature and a test for it. |
Uh oh!
There was an error while loading. Please reload this page.
Item 2 of the following comment states how Internet.nl now handles CSP "none" when combined with other sources, according to @gthess: #325 (comment)
Below is the relevant quote:
In the CSP specification, however, I read the following:
Source: https://www.w3.org/TR/CSP3/#match-url-to-source-list
So our CSP subtest does not seem to be fully in line with the CSP specification.
The text was updated successfully, but these errors were encountered: