问题
Say I have this header set on mywebsite.com
:
Content-Security-Policy: script-src self https://*.example.com
I know it will allow https://foo.example.com
and https://bar.example.com
, but will it allow https://example.com
alone?
Looking at the spec....
Hosts such as example.com (which matches any resource on the host, regardless of scheme) or *.example.com (which matches any resource on the host or any of its subdomains (and any of its subdomains' subdomains, and so on))
...it seems as it should allow plain https://example.com
. However, I've found several different sites (site 1, site 2, site 3, site 4) that all say that https://example.com
isn't included. Which is it?
回答1:
That text cited from the CSP spec appears to be wrong, and the other sources cited are right.
But that https://www.w3.org/TR/CSP/#source-expression section cited, which defines what a CSP source expression is, isn’t actually stating the relevant normative requirements.
Instead the section of the CSP spec that does actually normatively define the relevant requirements is the Does url match expression in origin with redirect count algorithm, in a substep at https://www.w3.org/TR/CSP/#ref-for-grammardef-host-part-2 which reads:
If the first character of expression’s host-part is an U+002A ASTERISK character (
*
):
- Let remaining be the result of removing the leading "
*
" from expression.- If remaining (including the leading U+002E FULL STOP character (
.
)) is not an ASCII case-insensitive match for the rightmost characters ofurl
’s host, then return "Does Not Match".
The including the leading U+002E FULL STOP character (.
) part of the requirement indicates the remaining part after the asterisk is removed includes the leading full stop, and so the rightmost characters of url
’s host must also start with a dot in order to match that.
In other words, if you start with *.example.com
and walk through that part of the algorithm, you start by removing the *
to get .example.com
as the remaining part, and then you match the rightmost characters of url
's host against that, including the leading full stop.
So https://foo.example.com
matches, because the rightmost characters of its host part match .example.com
, but https://example.com
doesn’t match, because the rightmost characters of its host part don’t match .example.com
(because it lacks the included full stop).
2017-10-13 update
A while back I reported the problem with the CSP spec and it’s now been fixed.
The relevant part of the CSP spec now reads:
Hosts such as
example.com
(which matches any resource on the host, regardless of scheme) or*.example.com
(which matches any resource on the host’s subdomains (and any of its subdomains' subdomains, and so on))
Notice that the part which had read “matches any resource on the host or any of its subdomains” now just reads “matches any resource on the host’s subdomains”.
回答2:
According to Mozilla's docs you should include 'self'
as well as *.example.com
in the CSP header if you want to include the base domain.
来源:https://stackoverflow.com/questions/44850590/does-a-example-com-for-a-content-security-policy-header-also-match-example-com