diff options
author | Philip Sargent <philip.sargent@klebos.com> | 2021-04-05 14:01:15 +0100 |
---|---|---|
committer | Philip Sargent <philip.sargent@klebos.com> | 2021-04-05 14:01:15 +0100 |
commit | 409037bdf34742a1eee9b77cc50c5670035d6163 (patch) | |
tree | 3a1aaf1950a57e01bee42c40883ff5f658c6a60b /security-warnings.txt | |
parent | 53fef140240a90f6b434d0146dff18fc139c2cc3 (diff) | |
download | troggle-409037bdf34742a1eee9b77cc50c5670035d6163.tar.gz troggle-409037bdf34742a1eee9b77cc50c5670035d6163.tar.bz2 troggle-409037bdf34742a1eee9b77cc50c5670035d6163.zip |
tiny tidyings
Diffstat (limited to 'security-warnings.txt')
-rw-r--r-- | security-warnings.txt | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security-warnings.txt b/security-warnings.txt index 4b489c0..6c90561 100644 --- a/security-warnings.txt +++ b/security-warnings.txt @@ -1,10 +1,10 @@ System check identified some issues: WARNINGS: -?: (security.W001) You do not have 'django.middleware.security.SecurityMiddleware' in your MIDDLEWARE_CLASSES so the SECURE_HSTS_SECONDS, SECURE_CONTENT_TYPE_NOSNIFF, SECURE_BROWSER_XSS_FILTER, and SECURE_SSL_REDIRECT settings will have no effect. -?: (security.W012) SESSION_COOKIE_SECURE is not set to True. Using a secure-only session cookie makes it more difficult for network traffic sniffers to hijack user sessions. -?: (security.W016) You have 'django.middleware.csrf.CsrfViewMiddleware' in your MIDDLEWARE_CLASSES, but you have not set CSRF_COOKIE_SECURE to True. Using a secure-only CSRF cookie makes it more difficult for network traffic sniffers to steal the CSRF token. +?: (security.W001) You do not have 'django.middleware.security.SecurityMiddleware' in your MIDDLEWARE so the SECURE_HSTS_SECONDS, SECURE_CONTENT_TYPE_NOSNIFF, SECURE_BROWSER_XSS_FILTER, and SECURE_SSL_REDIRECT settings will have no effect. +?: (security.W002) You do not have 'django.middleware.clickjacking.XFrameOptionsMiddleware' in your MIDDLEWARE, so your pages will not be served with an 'x-frame-options' header. Unless there is a good reason for your site to be served in a frame, you should consider enabling this header to help prevent clickjacking attacks. +?: (security.W003) You don't appear to be using Django's built-in cross-site request forgery protection via the middleware ('django.middleware.csrf.CsrfViewMiddleware' is not in your MIDDLEWARE). Enabling the middleware is the safest approach to ensure you don't leave any holes. +?: (security.W010) You have 'django.contrib.sessions' in your INSTALLED_APPS, but you have not set SESSION_COOKIE_SECURE to True. Using a secure-only session cookie makes it more difficult for network traffic sniffers to hijack user sessions. ?: (security.W018) You should not have DEBUG set to True in deployment. -?: (security.W019) You have 'django.middleware.clickjacking.XFrameOptionsMiddleware' in your MIDDLEWARE_CLASSES, but X_FRAME_OPTIONS is not set to 'DENY'. The default is 'SAMEORIGIN', but unless there is a good reason for your site to serve other parts of itself in a frame, you should change it to 'DENY'. System check identified 5 issues (0 silenced). |