summaryrefslogtreecommitdiffstats
path: root/security-warnings.txt
diff options
context:
space:
mode:
authorPhilip Sargent <philip.sargent@klebos.com>2021-04-05 14:01:15 +0100
committerPhilip Sargent <philip.sargent@klebos.com>2021-04-05 14:01:15 +0100
commit409037bdf34742a1eee9b77cc50c5670035d6163 (patch)
tree3a1aaf1950a57e01bee42c40883ff5f658c6a60b /security-warnings.txt
parent53fef140240a90f6b434d0146dff18fc139c2cc3 (diff)
downloadtroggle-409037bdf34742a1eee9b77cc50c5670035d6163.tar.gz
troggle-409037bdf34742a1eee9b77cc50c5670035d6163.tar.bz2
troggle-409037bdf34742a1eee9b77cc50c5670035d6163.zip
tiny tidyings
Diffstat (limited to 'security-warnings.txt')
-rw-r--r--security-warnings.txt8
1 files changed, 4 insertions, 4 deletions
diff --git a/security-warnings.txt b/security-warnings.txt
index 4b489c0..6c90561 100644
--- a/security-warnings.txt
+++ b/security-warnings.txt
@@ -1,10 +1,10 @@
System check identified some issues:
WARNINGS:
-?: (security.W001) You do not have 'django.middleware.security.SecurityMiddleware' in your MIDDLEWARE_CLASSES so the SECURE_HSTS_SECONDS, SECURE_CONTENT_TYPE_NOSNIFF, SECURE_BROWSER_XSS_FILTER, and SECURE_SSL_REDIRECT settings will have no effect.
-?: (security.W012) SESSION_COOKIE_SECURE is not set to True. Using a secure-only session cookie makes it more difficult for network traffic sniffers to hijack user sessions.
-?: (security.W016) You have 'django.middleware.csrf.CsrfViewMiddleware' in your MIDDLEWARE_CLASSES, but you have not set CSRF_COOKIE_SECURE to True. Using a secure-only CSRF cookie makes it more difficult for network traffic sniffers to steal the CSRF token.
+?: (security.W001) You do not have 'django.middleware.security.SecurityMiddleware' in your MIDDLEWARE so the SECURE_HSTS_SECONDS, SECURE_CONTENT_TYPE_NOSNIFF, SECURE_BROWSER_XSS_FILTER, and SECURE_SSL_REDIRECT settings will have no effect.
+?: (security.W002) You do not have 'django.middleware.clickjacking.XFrameOptionsMiddleware' in your MIDDLEWARE, so your pages will not be served with an 'x-frame-options' header. Unless there is a good reason for your site to be served in a frame, you should consider enabling this header to help prevent clickjacking attacks.
+?: (security.W003) You don't appear to be using Django's built-in cross-site request forgery protection via the middleware ('django.middleware.csrf.CsrfViewMiddleware' is not in your MIDDLEWARE). Enabling the middleware is the safest approach to ensure you don't leave any holes.
+?: (security.W010) You have 'django.contrib.sessions' in your INSTALLED_APPS, but you have not set SESSION_COOKIE_SECURE to True. Using a secure-only session cookie makes it more difficult for network traffic sniffers to hijack user sessions.
?: (security.W018) You should not have DEBUG set to True in deployment.
-?: (security.W019) You have 'django.middleware.clickjacking.XFrameOptionsMiddleware' in your MIDDLEWARE_CLASSES, but X_FRAME_OPTIONS is not set to 'DENY'. The default is 'SAMEORIGIN', but unless there is a good reason for your site to serve other parts of itself in a frame, you should change it to 'DENY'.
System check identified 5 issues (0 silenced).