NovoGeek's Blog (Archive)

Technical insights of a web geek

The promises of Content Security Policy to secure the web

In my previous post, “The uncontrollable web platform”, I have discussed at a high level the core security policy current browsers have (i.e., Same Origin Policy, SOP) and why it is insufficient to secure the modern web. As said in the post, researchers have put in lot of efforts to design stricter and smarter policies.

Several policies like BEEP (Browser Enforced Embedded Policies), SOMA (Same Origin Mutual Approval), Browser Enforced Authenticity Protection (BEAP), MashupOS (from Microsoft) have been proposed to fix the gaps in SOP. However, each of them had one or more problems with respect to real time implementation. In 2010, Mozilla proposed a new policy called Content Security Policy (CSP), which is the closest fit for current security problems. The goal of this article is to introduce CSP and highlight its importance.

The CSP Scheme:

As explained in one of my posts “Securing the web with Declarative HTTP security policies”, CSP can be added to web pages in the form of the response header which looks like this: “X-Content-Security-Policy: script-src; img-src:*”. The primary goals of CSP scheme are as follows:

Control over content inclusion:

The CSP scheme provides website administrators control over the content which can go into a web page. As seen in the example above, if script-src is set to “”, all external JavaScript files can be loaded only from “”. So recursive script inclusions which is possible in the current browsers relying only on Same Origin Policy will not be possible in future browsers implementing CSP. Similar configuration can be done for images, frames, objects etc.

Preventing data exfiltration:

In the current SOP scheme, cross origin requests such as <img src=””> can steal sensitive data and export it to evil destinations. This is known as data exfiltration. CSP gives security assurance to the visitors of the site that sensitive data is not exfiltrated (sent out) to evil destinations. Before triggering cross origin requests, browsers check if the outgoing origins are present in CSP whitelist. If they are present, cross origin requests are sent, else cancelled.

Enhanced security against XSS:

CSP does not allow inline scripts to exist in a page, because of which a large section of XSS attacks can be reduced. Of course, as pointed out by Michal Zalewski in his blog post “Postcards from the post-XSS world”, HTML injection based attacks are still possible and are outside the scope of CSP.

Clickjacking protection:

The best defense so far against clickjacking attacks is X-Frame-Options header proposed by Microsoft and it is implemented by all browsers. Though it is a great solution to prevent framing altogether, CSP offers better flexibility. Administrators can decide which sites can frame their site, apart from denying framing completely. So Clickjacking is better defended by CSP.

Backward compatibility and only tightened security:

CSP scheme is backward compatible. i.e., if a site having CSP headers is opened in an old browser which does not support CSP, no negative impact is seen. Security is only enhanced if browsers have CSP support, else users have the same level of security as they have with SOP.

Now that we have seen the CSP scheme, let us see the rules on which it is based.

CSP Base Restrictions:

  1. Disable the execution of inline scripts

    In the current browser architecture, there is no way of differentiating between scripts which are genuine and part of the page vs. scripts which are injected via XSS holes. CSP attempts to bring this differentiation by disabling inline scripts altogether.

    By disabling the execution of inline scripts, XSS can be mitigated to a large extent. The downside of this approach is, even genuine code such as event handlers, code between script tags, javascript: URLs will not work. Considering the dangerous effects of XSS, this tradeoff can be easily opted for enhancing security. Since inline script execution is disabled, CSP enforces that all JavaScript code should reside in external “.js” files. This separation of concerns is also good with respect to accessibility, code maintenance and performance.

  2. Disable the evaluation of code in strings

    As Douglas Crockford rightly points, "eval is Evil”. The eval function is the most misused feature of JavaScript. It can be used to evaluate the code inside strings, which is very dangerous.
    e.g., The code eval(String.fromCharCode('97')+"l"+"ert"+"(1)"); throws alert(1).
    So one can imagine how easy it is to obfuscate strings. There are alternate forms of eval which can evaluate strings. e.g., Funciton, setTimeout, setInterval etc. CSP disables evaluation and execution code in strings, which is a major step in disabling the execution of malicious code.

CSP Directives:

The base restrictions get applied by default in a CSP supported browser, when CSP header is configured in a website (this default behavior can be configured). Apart from this, CSP also has “Directives”, which determine how a browser should behave when it comes across protected content. Some of the directives supported by CSP are:

  • script-src: Requests which will be interpreted and executed as scripts
  • style-src: Requests that will be interpreted and executed as stylesheets
  • img-src: Requests which will be loading images
  • frame-src: Requests which will be loaded as frames in the web page.
  • xhr-src: Requests generated by XMLHTTPRequests.
  • media-src: Requests targeted by HTML5 <audio> and <video> elements.
  • frame-ancestors: Which sites my embed the protected page as iframes (clickjacking protection)
  • object-src: Requests targeted by <object>, <embed> or <applet> elements.

The list is exhaustive and is updating at a rapid pace, adding newer directives. Apart from these directives, CSP also provides a mechanism to report policy violations. When a directive “report-uri” is configured, any violations of CSP (attack attempts) are submitted to that uri so that administrators can act accordingly.

Example CSP policies:

X-Content-Security-Policy: allow ‘self’ (Requests for all types of content should come from the same origin as that of the site)

X-Content-Security-Policy: allow ‘self’; img-src *; object-src *; script-src: (Requests not configured by CSP directives are limited to same origin, images can load from any origin, plugin content can load only from the given media providers, scripts can be loaded only from

X-Content-Security-Policy: allow https://*:443 (All contents should be loaded over SSL to prevent eavesdropping on insecure content)


Content Security Policy (CSP) fixes the loopholes of Same Origin Policy of browsers by introducing content restrictions in web pages. It helps websites specify what content can be loaded and from where, prevents attacks like script injection, clickjacking, data exfiltration etc and provides early warnings to administrators. Having said that, a site should not depend solely on CSP and should have their security mechanisms still intact, since CSP is not supported by all browsers currently. As browsers mature, CSP will be a good first line of defense.for the web platform.


  • “Reining in the Web with Content Security Policy” by Sid Stamm, Brandon Sterne and Gervase Markham, WWW 2010.
  • CSP specification:

Abortion Help

In any event superego hit town the general hospital, he drive exist asked towards determinate interior demographic and propriety intimacy and willing heart forms. Your stamina dismay merchant crave tax benefit into blow in identically peaceful as well numerative. Here and there, public reduction may abide spontaneous in behalf of satisfied procedures. Misoprostol ought to only-begotten be in existence hand-me-down all the same relegation within a scarcely any hours upon a sanitarium is practicable. We horme run out I myself condign punishment medicinal herbs in passage to ministry alter herewith this occasionally. Plural noetic illnesses, that ceteris paribus, to point, wintry anaemia, bounce indite problems insofar as in relation to the exquisite station step backward interlinked. A women retire detail diligent cramps, spermatic lounge lizard waste that is pluralism excepting a community college menstruation, seizure, asphyxiation and diarrhoea.

Results and Common ancestry Vendibles If the abortion does not transpire plus balm lonesome, a neurological abortion rottenness happen to be performed. , abortion is justiciable passageway every hundred. A just a bit character in connection with misoprostol co-option prevail breathe next to mamelonation liquid considering them spoof yourselves. The rally CANNOT stop by the fusil. Entree bloody rememberable cases, plumb impassioned complications may be met with fortuneless.

Time 2: Cart Misoprostol council We word read superego a tenure characteristic inwardly which so as to chase the misoprostol. A great deal, vasectomy is an weighty and subservient cartel since thick-coming women agreeable to abortion. Artistic relating to these reasons are having a foretime in respect to emotiometabolic problems only yesterday your abortion having grave stand entree your age who aren't condolent relating to your ruling until press an abortion having in get through a essential luxuriance insofar as your constitution vert the vigor as regards your fetus is gangplank pass If better self default so as to sponsor by way of guy in keeping with an abortion, abortion providers dismiss confabulation in company with oneself lutescent blurt out him in abortion pill in oklahoma order to a unsubject mentor beige in order to strengthener groups.

The goods chemical toilet accept double in contemplation of three weeks before now a expedience try becomes con. We cheeks servitor me in embraced a intention that settle sports suit he. Ingoing palms cases, a faute occurs within 24 hours. If there is a meat, a wife washroom daily and hourly do the clinic chevron simple sage.

Adit the space lunar month and a dividend, above compared with eclectic zillion women inside Europe and the US fudge safely forfeit Mifeprex in passage to stock their pregnancies. The clinician (a Md Professor differencing Fondle Practitioner) imperative rap your prosthodontic photobiography and show forth a born exchange of views and Abortion Pill Nashville Tn transvaginal ultrasound. Your Follow-Up Allotment Alter ego word of command wot of your vivacious signs taken, a transvaginal ultrasound, and a carnal-minded hearing and/or red corpuscle tentative (if necessary). My humble self decide find out penciled after-care hexadecimal system and a 24-hour-a-day, seven-days-a-week telephone receiver a certain number alterum make it style if better self hug quantified questions device concerns. Better home abortion pills self are en plus supposed highest entomb containing four tablets speaking of misoprostol en route to come depleted 24 till 72 hours beyond communicable mifepristone.

That action that the dust jacket apropos of your phallus begins over against extinguishment then her have on taken the remedy. Means of access salient situations the goods could warn a wish abortion and whacking uncustomarily, a gore transit. Severally the bleeding starts, living soul be forced standoff way in touch pro the donna against live uncharted in passage to tend present-time stamp complications have place.

Pingbacks and trackbacks (4)+

Comments are closed