Project

General

Profile

Actions

Task #2026

closed

scan sites with observatory.mozilla.org

Added by Florian Effenberger over 7 years ago. Updated almost 5 years ago.

Status:
Closed
Priority:
High
Category:
-
Target version:
Team - Q2/2018
Start date:
Due date:
% Done:

0%


Description

We should scan our sites with observatory.mozilla.org and see which errors are fixable (e.g. lack of OCSP Stapling which worked before) and which ones are optional (e.g. forced HTTPS).


Related issues

Related to Infrastructure - Task #2115: Request certs from Let's Encrypt for each HTTPS vhostClosedGuilhem Moulin

Actions
Related to Infrastructure - Task #2441: Start using the headers Content Security Policy, X-Content-Type-Options, X-Frame-Options and X-XSS-ProtectionRejectedGuilhem Moulin

Actions
Actions #1

Updated by Florian Effenberger over 7 years ago

  • URL set to https://observatory.mozilla.org/analyze.html?host=libreoffice.org
Actions #2

Updated by Florian Effenberger over 7 years ago

  • Assignee changed from Christian Lohmaier to Guilhem Moulin

re-assigning to Guilhem in order to clean up Redmine queues
nothing concrete to do at the moment

Actions #3

Updated by Florian Effenberger over 7 years ago

  • Related to Task #2115: Request certs from Let's Encrypt for each HTTPS vhost added
Actions #4

Updated by Florian Effenberger over 7 years ago

  • Target version changed from Qlater to Q4/2016
Actions #5

Updated by Florian Effenberger over 7 years ago

  • Target version changed from Q4/2016 to Q1/2017
Actions #6

Updated by Florian Effenberger about 7 years ago

  • Target version changed from Q1/2017 to Q2/2017

Makes only sense after all the migrations have been done, shifting to Q2

Actions #7

Updated by Florian Effenberger about 7 years ago

  • Target version changed from Q2/2017 to Pool
Actions #8

Updated by Florian Effenberger almost 7 years ago

  • Priority changed from Normal to High
  • Target version changed from Pool to Q3/2017
Actions #9

Updated by Florian Effenberger over 6 years ago

With the HTTPS ticket (#2312) pending, the results won't be optimal - but if possible, I'd like to see a first scan by LibOCon, so we know if there is something else that needs to be fixed independently

Actions #10

Updated by Florian Effenberger over 6 years ago

Eike pointed me to https://webbkoll.dataskydd.net which is an additional service to check with

Actions #11

Updated by Florian Effenberger over 6 years ago

  • Target version changed from Q3/2017 to Q4/2017
Actions #12

Updated by Florian Effenberger over 6 years ago

  • Related to Task #2441: Start using the headers Content Security Policy, X-Content-Type-Options, X-Frame-Options and X-XSS-Protection added
Actions #13

Updated by Florian Effenberger about 6 years ago

  • Target version changed from Q4/2017 to Q1/2018

Can we run a first scan this quarter, Guilhem? For another tasks you're collecting all VHosts anyways, so doing a first run to get a first impression would be great. We then can decide when and how to act on the findings.

Actions #14

Updated by Florian Effenberger almost 6 years ago

  • Target version changed from Q1/2018 to Q2/2018

I know you're quite swamped with other things, but let's aim for getting that done by end-Q2 :-)

Actions #15

Updated by Florian Effenberger over 5 years ago

What prevents us from doing that? This has been pending since last LibOCon actually, and it shouldn't take too much time IMHO to do a first run
Is this sth. maybe another team member can help with?

Actions #16

Updated by Guilhem Moulin almost 5 years ago

I'm personally really not fond of the hype for gamification of security, and blindly applying the same scoring algorithm for all services doesn't make sense IMHO. For example for a bunch of static & self-contained pages that are only modifiable by root, a CSP is far less useful than for a forum with user-provided content. Sure, a strict CSP doesn't hurt, but a missing CSP will significantly lower the score equally in both cases, thus in my eyes the score should be taken with a grain of salt. Blindly aiming for a perfect score, and give ourselves a pad on the back and brag about it when/if we're there, isn't necessarily helpful.

FWIW the checks were done a while ago already (2018). Also it's a third party service, no need to have special infra powers for that — some stuff, like HSTS and HPKP, should be implemented by the infra team indeed; for others like CSP, referrer policy and other custom headers the various upstream frontends are in a much better position to do that (or document it so we can it to our HTTPd config).

HSTS, HPKP and CSP have been on the table for a while, see old infra call minutes; for the rest we need to have hints from the various upstream teams. They might need to refactor their code accordingly too, for instance isolate the CSS/JS code — for some, like Nextcloud, it's already in place; for the rest we need to wait for new releases.

Actions #17

Updated by Florian Effenberger almost 5 years ago

  • Status changed from New to Closed

Fine for me if it was done in 2018 and no immediate problems were found

Actions

Also available in: Atom PDF