This header is used to configure the built in reflective XSS protection found in Internet Explorer, Chrome and Safari (Webkit). Valid settings for the header are 0, which disables the protection, 1 which enables the protection and 1; mode=block which tells the browser to block the response if it detects an attack rather than sanitising the script.
app.UseXXssProtection(options => options.EnabledWithBlockMode());
Nice and easy to configure, this header only has one valid value, nosniff. It prevents Google Chrome and Internet Explorer from trying to mime-sniff the content-type of a response away from the one being declared by the server.
app.UseXContentTypeOptions();
HSTS allows you to tell a browser that you always want a user to connect using HTTPS instead of HTTP. This means any bookmarks, links or addresses the user types will be forced to use HTTPS, even if they specify HTTP.
app.UseHsts(options => options.MaxAge(30).AllResponses());
https://scotthelme.co.uk/hsts-the-missing-link-in-tls/
The X-Frame-Options header (RFC), or XFO header, protects your visitors against clickjacking attacks by controlling if/when your website is allowed to be loaded in an iframe.
app.UseXfo(options => options.SameOrigin());
https://www.troyhunt.com/clickjack-attack-hidden-threat-right-in/
The X-Download-Options is specific to IE 8, and is related to how IE 8 handles downloaded HTML files. Turns out if you download an HTML file from a web page and chooses to “Open” it in IE, it will execute in the context of the web site. That means that any scripts in that file will also execute with the origin of the web site.
app.UseXDownloadOptions();
https://www.nwebsec.com/HttpHeaders/SecurityHeaders/XDownloadOptions
The CSP header allows you to define a whitelist of approved sources of content for your site. By restricting the assets that a browser can load for your site, like js and css, CSP can act as an effective countermeasure to XSS attacks.
app.UseCsp(options => options .DefaultSources(s => s.Self()) .ConnectSources(s => s.Self()) .ScriptSources(s => s.Self()) .StyleSources(s => s.Self().UnsafeInline()) .ImageSources(s => s.Self().CustomSources("data:")) .FontSources(s => s.Self()) .ReportUris(r => r.Uris("https://mysite.report-uri.io/r/default/csp/enforce")));
https://scotthelme.co.uk/content-security-policy-an-introduction/
https://docs.nwebsec.com/en/4.2/nwebsec/Configuring-csp.html
HPKP allows you to protect yourself in cases of a compromised trusted Certification Authority by providing a whitelist of cryptographic identities that the browser should trust. Whilst HSTS says the browser must always use HTTPS, HPKP says the browser should only ever accept a specific set of certificates.
app.UseHpkpReportOnly(options => options .Sha256Pins( "hashkey1=", "hashkey2", "hashbackupkey1", "hashbackupkey2") .MaxAge(days: 180) .IncludeSubdomains() .ReportUri("https://mysite.report-uri.io/r/default/hpkp/reportOnly"));
https://scotthelme.co.uk/hpkp-http-public-key-pinning/
When a user clicks a link on one site, the origin, that takes them to another site, the destination, the destination site receives information about the origin the user came from. This referer header lets me know where the inbound visitor came from, and is really handy, but there are cases where we may want to control or restrict the amount of information present in this header like the path or even whether the header is sent at all.
app.UseReferrerPolicy(options => options.StrictOriginWhenCrossOrigin());
https://scotthelme.co.uk/a-new-security-header-referrer-policy/
This header allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
https://scotthelme.co.uk/a-new-security-header-expect-ct/
Removing information about your server and frameworks / components in your application is just as important, as some of this information can be used by attackers to exploit known vulnerabilities in a particular platform, or narrow their attack to discover exploits more quickly.
Headers such as Server, X-Powered-By, X-AspNet-Version, and other identifying headers should be removed from all responses.
new WebHostBuilder() ... .UseKestrel(options => { options.AddServerHeader = false; }) ... .Build();
https://securityheaders.com - Scan website for security headers
https://report-uri.com/ - Collect and report on browser-reported security violations’
Quick Links
Legal Stuff