Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Improve security and ciphers

Improve security and ciphers

Scheduled Pinned Locked Moved Solved Support
security
8 Posts 3 Posters 2.1k Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    saglagla
    wrote on last edited by girish
    #1

    Hello,

    Regarding to :

    • https://securityheaders.io
    • https://observatory.mozilla.org/analyze/
    • https://tls.imirhil.fr/smtp/
    • https://tls.imirhil.fr/https/

    There is a way to improve security (ciphers, like Content-Security-Policy in https headers by example).
    Also, I've notice that each application have his own score which means that reverse-proxy configuration is not iso for each app ? Is it normal ?

    1 Reply Last reply
    2
    • girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #2

      @saglagla It should be the same for all apps since Cloudron uses a reverse proxy internally.

      I checked my.cloudron.io (cloudron), git.cloudron.io (gitlab), chat.cloudron.io (rocketchat) and forum.cloudron.io (nodebb), files.cloudron.io (nextcloud). I get A for all the domains. The CSP headers have to be ideally set by the upstream app, most of them do not set it (but nextcloud does).

      S 1 Reply Last reply
      0
      • girishG girish

        @saglagla It should be the same for all apps since Cloudron uses a reverse proxy internally.

        I checked my.cloudron.io (cloudron), git.cloudron.io (gitlab), chat.cloudron.io (rocketchat) and forum.cloudron.io (nodebb), files.cloudron.io (nextcloud). I get A for all the domains. The CSP headers have to be ideally set by the upstream app, most of them do not set it (but nextcloud does).

        S Offline
        S Offline
        saglagla
        wrote on last edited by
        #3

        @girish said in Improve security and ciphers:

        my.cloudron.io

        If you check on the mozilla observatory https://observatory.mozilla.org/analyze/my.cloudron.io get a B due to CSP.

        Also, if you're using :https://tls.imirhil.fr/ with http test, you'll get a C

        0_1523344438832_c78276d9-f238-45ac-aedb-12d400d71a5c-image.png

        1 Reply Last reply
        0
        • girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #4

          @saglagla I see, thanks. The low score seems of https://observatory.mozilla.org/analyze/my.cloudron.io is because of the lack of CSP headers (a big -25!). We used to have CSP but I think @nebulon disabled it. @nebulon do you know why we disabled it?

          1 Reply Last reply
          0
          • nebulonN Offline
            nebulonN Offline
            nebulon
            Staff
            wrote on last edited by
            #5

            I pushed some CSP changes with https://git.cloudron.io/cloudron/box/commit/573d0e993ea519630aead4880605cd2a985cde82
            This is the minimal set of restrictions, which still work for the dashboard code currently.

            1 Reply Last reply
            0
            • S Offline
              S Offline
              saglagla
              wrote on last edited by saglagla
              #6

              Okay, okay.

              Ans, So, each app get his OWN web server ? Okay so it's complicated to uniform the security policy easily...
              Also, by example why allowing 3DES ? like DES-CBC3-SHA in all TLS version ?

              EDIT : I think every app need to be at a A or A+ grade in order to be validated for cloudron.
              Paperwork / Wallabag allow unsecure cookies by exemple :
              Session cookie set without the Secure flag, but transmission over HTTP prevented by HSTS

              EDIT 2 : Sorry for the twin-post
              Also, I'm just trying to follow up all the public recommandation from the french IT Sec agency

              1 Reply Last reply
              0
              • S Offline
                S Offline
                saglagla
                wrote on last edited by
                #7
                This post is deleted!
                1 Reply Last reply
                0
                • nebulonN Offline
                  nebulonN Offline
                  nebulon
                  Staff
                  wrote on last edited by
                  #8

                  I have updated the ciphers now according to mozilla's config generator. The commit is https://git.cloudron.io/cloudron/box/commit/ddaa52163bf3844b36d6c29fdffb5db3e0b3f5d0

                  For the CSP settings, this indeed cannot properly be done on a platform level, as apps require differently strict settings there and have to provide this on their own, so this should ideally be fixed in each app upstream.

                  1 Reply Last reply
                  1
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • Bookmarks
                  • Search