1
0
Fork 0
mirror of https://github.com/sinatra/sinatra synced 2023-03-27 23:18:01 -04:00
sinatra/rack-protection
2013-09-12 10:50:38 +02:00
..
lib Ensure that session contains a csrf token after "safe" requests 2013-09-10 13:46:16 -07:00
spec spec only cares about presence of csrf token, not length 2013-09-10 13:46:16 -07:00
.gitignore ignore Gemfile.lock 2011-09-30 15:50:51 -05:00
.travis.yml allow ruby-head to fail on travis due to bundler issues 2013-09-12 10:50:38 +02:00
Gemfile Use magic comment 2013-05-14 21:14:21 -07:00
License initial commit 2011-05-23 10:07:54 +02:00
rack-protection.gemspec bump version, regenerate gemspec 2013-03-13 07:39:42 +01:00
Rakefile v1.4.0 2013-03-01 15:55:54 +11:00
README.md Add instrumentation support 2013-08-21 15:02:02 -04:00

You should use protection!

This gem protects against typical web attacks. Should work for all Rack apps, including Rails.

Usage

Use all protections you probably want to use:

# config.ru
require 'rack/protection'
use Rack::Protection
run MyApp

Skip a single protection middleware:

# config.ru
require 'rack/protection'
use Rack::Protection, :except => :path_traversal
run MyApp

Use a single protection middleware:

# config.ru
require 'rack/protection'
use Rack::Protection::AuthenticityToken
run MyApp

Prevented Attacks

Cross Site Request Forgery

Prevented by:

  • Rack::Protection::AuthenticityToken (not included by use Rack::Protection)
  • Rack::Protection::FormToken (not included by use Rack::Protection)
  • Rack::Protection::JsonCsrf
  • Rack::Protection::RemoteReferrer (not included by use Rack::Protection)
  • Rack::Protection::RemoteToken
  • Rack::Protection::HttpOrigin

Cross Site Scripting

Prevented by:

  • Rack::Protection::EscapedParams (not included by use Rack::Protection)
  • Rack::Protection::XSSHeader (Internet Explorer only)

Clickjacking

Prevented by:

  • Rack::Protection::FrameOptions

Directory Traversal

Prevented by:

  • Rack::Protection::PathTraversal

Session Hijacking

Prevented by:

  • Rack::Protection::SessionHijacking

IP Spoofing

Prevented by:

  • Rack::Protection::IPSpoofing

Installation

gem install rack-protection

Instrumentation

Instrumentation is enabled by passing in an instrumenter as an option.

use Rack::Protection, instrumenter: ActiveSupport::Notifications

The instrumenter is passed a namespace (String) and environment (Hash). The namespace is 'rack.protection' and the attack type can be obtained from the environment key 'rack.protection.attack'.