Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Content-Security-Policy" with CloudFlare persists in version 14 (Beta) #10557

Closed
ykcab opened this issue Aug 6, 2018 · 5 comments
Closed

"Content-Security-Policy" with CloudFlare persists in version 14 (Beta) #10557

ykcab opened this issue Aug 6, 2018 · 5 comments
Labels
0. Needs triage Pending check for reproducibility or if it fits our roadmap bug

Comments

@ykcab
Copy link

ykcab commented Aug 6, 2018

with DNS behind cloudflare, the same issue of "Content-Security-Policy" is again present in version 14 Beta.
-->

Steps to reproduce

  1. have your domain on Cloudflare
  2. when you go to your browser: hxxps://your[.]domain[.]com, for the first time you will be able to configure/finish the installation but after the initial setup you will, the login button has no effect at all.
  3. login with you local IP (internal lan/wifi), no issue

Actual behavior

see attached image and similarly to this previous version issue (#4840)

Server configuration

Operating system:
Debian Stretch 9
Web server:
NGINX 1.12
Database:
MariaDB
PHP version:
PHP7.0
Nextcloud version: (see Nextcloud admin page)
Nextcloud Beta 1
Updated from an older Nextcloud/ownCloud or fresh install:
Fresh Installation
Where did you install Nextcloud from:
Official nextcloud web page

this image show the problem
screen shot 2018-08-05 at 5 12 32 pm

@nextcloud-bot
Copy link
Member

GitMate.io thinks possibly related issues are #4840 ("Content-Security-Policy" with CloudFlare), #10495 (14 Beta 2), #6018 (nextcloud Content-Security-Policy problem), #5873 (Content Security Policy Headers and multiple trusted_domains), and #9297 (How to disable the Content Security Policy ?).

@rullzer
Copy link
Member

rullzer commented Aug 6, 2018

As stated in #4840 this is indeed unsupported and will most likely break.

On top of that this means that cloudflare can do MITM attacks as you allow it to rewrite your html.

@ykcab
Copy link
Author

ykcab commented Aug 6, 2018

@rullzer Cloudflare is a legitimate CDN service, why would you flag them to impersonate with MITM attack?

@rullzer
Copy link
Member

rullzer commented Aug 6, 2018

I'm not saying they are doing it. I'm saying they can do it in your setup. Which is something you should not want with your data.

@skjnldsv skjnldsv added the 0. Needs triage Pending check for reproducibility or if it fits our roadmap label Jun 12, 2019
@kesselb
Copy link
Contributor

kesselb commented Aug 17, 2019

As stated in #4840 this is indeed unsupported and will most likely break.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
0. Needs triage Pending check for reproducibility or if it fits our roadmap bug
Projects
None yet
Development

No branches or pull requests

5 participants