1 #pragma once
2 
3 #include "bmcweb_config.h"
4 
5 #include "http_request.hpp"
6 #include "http_response.hpp"
7 
8 inline void addSecurityHeaders(const crow::Request& req [[maybe_unused]],
9                                crow::Response& res)
10 {
11     /*
12      TODO(ed) these should really check content types.  for example,
13      X-Content-Type-Options header doesn't make sense when retrieving a JSON or
14      javascript file.  It doesn't hurt anything, it's just ugly.
15      */
16     using bf = boost::beast::http::field;
17 
18     // Recommendations from https://owasp.org/www-project-secure-headers/
19     // https://owasp.org/www-project-secure-headers/ci/headers_add.json
20     res.addHeader(bf::strict_transport_security, "max-age=31536000; "
21                                                  "includeSubdomains");
22     res.addHeader(bf::x_frame_options, "DENY");
23 
24     res.addHeader(bf::pragma, "no-cache");
25     res.addHeader(bf::cache_control, "no-store, max-age=0");
26 
27     res.addHeader("X-Content-Type-Options", "nosniff");
28 
29     res.addHeader("Referrer-Policy", "no-referrer");
30     res.addHeader("Permissions-Policy", "accelerometer=(),"
31                                         "ambient-light-sensor=(),"
32                                         "autoplay=(),"
33                                         "battery=(),"
34                                         "camera=(),"
35                                         "display-capture=(),"
36                                         "document-domain=(),"
37                                         "encrypted-media=(),"
38                                         "fullscreen=(),"
39                                         "gamepad=(),"
40                                         "geolocation=(),"
41                                         "gyroscope=(),"
42                                         "layout-animations=(self),"
43                                         "legacy-image-formats=(self),"
44                                         "magnetometer=(),"
45                                         "microphone=(),"
46                                         "midi=(),"
47                                         "oversized-images=(self),"
48                                         "payment=(),"
49                                         "picture-in-picture=(),"
50                                         "publickey-credentials-get=(),"
51                                         "speaker-selection=()"
52                                         "sync-xhr=(self),"
53                                         "unoptimized-images=(self),"
54                                         "unsized-media=(self),"
55                                         "usb=(),"
56                                         "screen-wak-lock=(),"
57                                         "web-share=(),"
58                                         "xr-spatial-tracking=()");
59 
60     res.addHeader("X-Permitted-Cross-Domain-Policies", "none");
61 
62     res.addHeader("Cross-Origin-Embedder-Policy", "require-corp");
63     res.addHeader("Cross-Origin-Opener-Policy", "same-origin");
64     res.addHeader("Cross-Origin-Resource-Policy", "same-origin");
65 
66     if (bmcwebInsecureDisableXssPrevention == 0)
67     {
68         res.addHeader("Content-Security-Policy", "default-src 'none'; "
69                                                  "img-src 'self' data:; "
70                                                  "font-src 'self'; "
71                                                  "style-src 'self'; "
72                                                  "script-src 'self'; "
73                                                  "connect-src 'self' wss:; "
74                                                  "form-action 'none'; "
75                                                  "frame-ancestors 'none'; "
76                                                  "object-src 'none'; "
77                                                  "base-uri 'none' ");
78         // The KVM currently needs to load images from base64 encoded
79         // strings. img-src 'self' data: is used to allow that.
80         // https://stackoverflow.com/questions/18447970/content-security-polic
81         // y-data-not-working-for-base64-images-in-chrome-28
82     }
83     else
84     {
85         // If XSS is disabled, we need to allow loading from addresses other
86         // than self, as the BMC will be hosted elsewhere.
87         res.addHeader("Content-Security-Policy", "default-src 'none'; "
88                                                  "img-src *; "
89                                                  "font-src *; "
90                                                  "style-src *; "
91                                                  "script-src *; "
92                                                  "connect-src *; "
93                                                  "form-action *; "
94                                                  "frame-ancestors *; "
95                                                  "object-src *; "
96                                                  "base-uri *");
97 
98         std::string_view origin = req.getHeaderValue("Origin");
99         res.addHeader(bf::access_control_allow_origin, origin);
100         res.addHeader(bf::access_control_allow_methods, "GET, "
101                                                         "POST, "
102                                                         "PUT, "
103                                                         "PATCH, "
104                                                         "DELETE");
105         res.addHeader(bf::access_control_allow_credentials, "true");
106         res.addHeader(bf::access_control_allow_headers, "Origin, "
107                                                         "Content-Type, "
108                                                         "Accept, "
109                                                         "Cookie, "
110                                                         "X-XSRF-TOKEN");
111     }
112 }
113