Confirmed users
491
edits
Line 179: | Line 179: | ||
* The server rejects the requested action if the CSRF token fails validation | * The server rejects the requested action if the CSRF token fails validation | ||
===Preventing ClickJacking=== | ===Preventing Malicious Site Framing (ClickJacking)=== | ||
A newer attack that uses page layering and framing to convince the user to click or enter data on particular parts of the screen. These actions are actually sent to the framed site to perform actions unbeknown to the victim user. Read more about this attack type [http://www.sectheory.com/clickjacking.htm here] | A newer attack that uses page layering and framing to convince the user to click or enter data on particular parts of the screen. These actions are actually sent to the framed site to perform actions unbeknown to the victim user. Read more about this attack type [http://www.sectheory.com/clickjacking.htm here] | ||
Set the x-frame-options header for all responses containing HTML content. The | |||
possible values are "DENY" or "SAMEORIGIN". | |||
* DENY will block any site (regardless of domain) from framing the content. | |||
* SAMEORIGIN will block all sites from framing the content, except sites within | |||
the same domain. | |||
The "DENY" setting is recommended unless a specific need has been identified | |||
for framing. | |||
===3rd Party Scripts=== | ===3rd Party Scripts=== |