Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps - Status | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Improve security and ciphers

Improve security and ciphers

Scheduled Pinned Locked Moved Solved Support
security
8 Posts 3 Posters 3.3k Views 4 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Offline
    S Offline
    saglagla
    wrote on last edited by girish
    #1

    Hello,

    Regarding to :

    • https://securityheaders.io
    • https://observatory.mozilla.org/analyze/
    • https://tls.imirhil.fr/smtp/
    • https://tls.imirhil.fr/https/

    There is a way to improve security (ciphers, like Content-Security-Policy in https headers by example).
    Also, I've notice that each application have his own score which means that reverse-proxy configuration is not iso for each app ? Is it normal ?

    1 Reply Last reply
    2
    • girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #2

      @saglagla It should be the same for all apps since Cloudron uses a reverse proxy internally.

      I checked my.cloudron.io (cloudron), git.cloudron.io (gitlab), chat.cloudron.io (rocketchat) and forum.cloudron.io (nodebb), files.cloudron.io (nextcloud). I get A for all the domains. The CSP headers have to be ideally set by the upstream app, most of them do not set it (but nextcloud does).

      S 1 Reply Last reply
      0
      • girishG girish

        @saglagla It should be the same for all apps since Cloudron uses a reverse proxy internally.

        I checked my.cloudron.io (cloudron), git.cloudron.io (gitlab), chat.cloudron.io (rocketchat) and forum.cloudron.io (nodebb), files.cloudron.io (nextcloud). I get A for all the domains. The CSP headers have to be ideally set by the upstream app, most of them do not set it (but nextcloud does).

        S Offline
        S Offline
        saglagla
        wrote on last edited by
        #3

        @girish said in Improve security and ciphers:

        my.cloudron.io

        If you check on the mozilla observatory https://observatory.mozilla.org/analyze/my.cloudron.io get a B due to CSP.

        Also, if you're using :https://tls.imirhil.fr/ with http test, you'll get a C

        0_1523344438832_c78276d9-f238-45ac-aedb-12d400d71a5c-image.png

        1 Reply Last reply
        0
        • girishG Offline
          girishG Offline
          girish
          Staff
          wrote on last edited by
          #4

          @saglagla I see, thanks. The low score seems of https://observatory.mozilla.org/analyze/my.cloudron.io is because of the lack of CSP headers (a big -25!). We used to have CSP but I think @nebulon disabled it. @nebulon do you know why we disabled it?

          1 Reply Last reply
          0
          • nebulonN Offline
            nebulonN Offline
            nebulon
            Staff
            wrote on last edited by
            #5

            I pushed some CSP changes with https://git.cloudron.io/cloudron/box/commit/573d0e993ea519630aead4880605cd2a985cde82
            This is the minimal set of restrictions, which still work for the dashboard code currently.

            1 Reply Last reply
            0
            • S Offline
              S Offline
              saglagla
              wrote on last edited by saglagla
              #6

              Okay, okay.

              Ans, So, each app get his OWN web server ? Okay so it's complicated to uniform the security policy easily...
              Also, by example why allowing 3DES ? like DES-CBC3-SHA in all TLS version ?

              EDIT : I think every app need to be at a A or A+ grade in order to be validated for cloudron.
              Paperwork / Wallabag allow unsecure cookies by exemple :
              Session cookie set without the Secure flag, but transmission over HTTP prevented by HSTS

              EDIT 2 : Sorry for the twin-post
              Also, I'm just trying to follow up all the public recommandation from the french IT Sec agency

              1 Reply Last reply
              0
              • S Offline
                S Offline
                saglagla
                wrote on last edited by
                #7
                This post is deleted!
                1 Reply Last reply
                0
                • nebulonN Offline
                  nebulonN Offline
                  nebulon
                  Staff
                  wrote on last edited by
                  #8

                  I have updated the ciphers now according to mozilla's config generator. The commit is https://git.cloudron.io/cloudron/box/commit/ddaa52163bf3844b36d6c29fdffb5db3e0b3f5d0

                  For the CSP settings, this indeed cannot properly be done on a platform level, as apps require differently strict settings there and have to provide this on their own, so this should ideally be fixed in each app upstream.

                  1 Reply Last reply
                  1

                  Hello! It looks like you're interested in this conversation, but you don't have an account yet.

                  Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

                  With your input, this post could be even better 💗

                  Register Login
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • Bookmarks
                  • Search