OwaspHeaders.Core
9.4.2
See the version list below for details.
dotnet add package OwaspHeaders.Core --version 9.4.2
NuGet\Install-Package OwaspHeaders.Core -Version 9.4.2
<PackageReference Include="OwaspHeaders.Core" Version="9.4.2" />
paket add OwaspHeaders.Core --version 9.4.2
#r "nuget: OwaspHeaders.Core, 9.4.2"
// Install OwaspHeaders.Core as a Cake Addin #addin nuget:?package=OwaspHeaders.Core&version=9.4.2 // Install OwaspHeaders.Core as a Cake Tool #tool nuget:?package=OwaspHeaders.Core&version=9.4.2
OwaspHeaders.Core
An ASP .NET Core middleware for injection OWASP recommended HTTP Headers for increased security. This project is designed against the OWASP Secure Headers Project.
Quick Starts
- Create a .NET (either Framework, Core, or 5+) project which uses ASP .NET Core
Example;
dotnet new webapi -n exampleProject
- Add a reference to the OwaspHeaders.Core NuGet package.
Example:
dotnet add package OwaspHeaders.Core
- Alter the program.cs file to include the following:
app.UseSecureHeadersMiddleware();
This will add a number of default HTTP headers to all responses from your server component.
The following is an example of the response headers from version 9.0.0 (taken on November 19th, 2024)
cache-control: max-age=31536000,private
content-security-policy: script-src 'self';object-src 'self';block-all-mixed-content;upgrade-insecure-requests;
cross-origin-resource-policy: same-origin
referrer-policy: no-referrer
strict-transport-security: max-age=31536000;includeSubDomains
x-content-type-options: nosniff
x-frame-options: DENY
x-permitted-cross-domain-policies: none;
x-xss-protection: 0
Please note: The above example contains only the headers added by the Middleware.
Source Code Repo
The source code for this NuGet package can be found at: https://github.com/GaProgMan/OwaspHeaders.Core.
Documentation
The documentation for this NuGet package can be found at: https://gaprogman.github.io/OwaspHeaders.Core/.
Issues and Bugs
Please raise any issues and bugs at the above mentioned source code repo.
Server Header: A Warning
The default configuration for this middleware removes the X-Powered-By
header, as this can help malicious users to use targeted attacks for specific server infrastructure. However, since the Server
header is added by the reverse proxy used when hosting an ASP .NET Core application, removing this header is out of scope for this middleware.
In order to remove this header, a web.config
file is required, and the following should be added to it:
<?xml version="1.0" encoding="UTF-8"?>
<configuration>
<system.webServer>
<security>
<requestFiltering removeServerHeader="true" />
</security>
</system.webServer>
</configuration>
The above XML is taken from this answer on ServerFault.
The web.config
file will need to be copied to the server when the application is deployed.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. net9.0 is compatible. |
-
net8.0
- No dependencies.
-
net9.0
- No dependencies.
NuGet packages (4)
Showing the top 4 NuGet packages that depend on OwaspHeaders.Core:
Package | Downloads |
---|---|
Whipstaff.AspNetCore
Re-usable logic for working with ASP.NET Core. |
|
wjsz-base
wjsz基础库 |
|
OwaspHeaders.IsolatedFunction
A .NET Core middleware for injecting the Owasp recommended HTTP Headers into Azure Isolated Functions |
|
DojoTools
Toolkit for microservices designing developed by Pod2 in Bakery Net Dojo at Globant - Aug 2022 |
GitHub repositories (2)
Showing the top 2 popular GitHub repositories that depend on OwaspHeaders.Core:
Repository | Stars |
---|---|
jeangatto/ASP.NET-Core-Clean-Architecture-CQRS-Event-Sourcing
ASP.NET Core, C#, CQRS Event Sourcing, REST API, DDD, SOLID Principles and Clean Architecture
|
|
GaProgMan/OnionArch
A .NET Core demo application which uses the Onion Architecture
|
Version | Downloads | Last updated | |
---|---|---|---|
9.6.0 | 0 | 12/26/2024 | |
9.5.0 | 128 | 12/23/2024 | |
9.4.3 | 2,730 | 12/11/2024 | |
9.4.2 | 913 | 12/4/2024 | |
9.4.1 | 375 | 12/4/2024 | |
9.4.0 | 169 | 12/3/2024 | |
9.3.0 | 309 | 12/3/2024 | |
9.2.3 | 171 | 12/2/2024 | |
9.2.2 | 83 | 12/2/2024 | |
9.2.1 | 80 | 12/2/2024 | |
9.2.0 | 154 | 12/2/2024 | |
9.1.1 | 512 | 11/28/2024 | |
9.0.1 | 1,959 | 11/20/2024 | |
9.0.0 | 139 | 11/20/2024 | |
8.1.3 | 12,624 | 10/19/2024 | |
8.1.2 | 107 | 10/19/2024 | |
8.1.1 | 117 | 10/19/2024 | |
8.1.0 | 55,232 | 5/30/2024 | |
8.0.0 | 92,422 | 12/3/2023 | |
7.5.1 | 45,258 | 8/9/2023 | |
7.5.0 | 26,709 | 6/7/2023 | |
7.0.1 | 1,940 | 6/5/2023 | |
7.0.0 | 212 | 6/5/2023 | |
6.1.0 | 3,170 | 5/15/2023 | |
6.0.5 | 416 | 5/15/2023 | |
6.0.4 | 191 | 5/15/2023 | |
6.0.3 | 199 | 5/15/2023 | |
6.0.2 | 366 | 5/11/2023 | |
6.0.1 | 198 | 5/11/2023 | |
6.0.0 | 1,128 | 5/11/2023 | |
5.0.0 | 274 | 5/11/2023 | |
4.6.2 | 2,191 | 5/11/2023 | |
4.6.1 | 193 | 5/11/2023 | |
4.6.0 | 223 | 5/11/2023 | |
4.5.1 | 215,283 | 5/15/2022 | |
4.5.0 | 499 | 5/15/2022 | |
4.4.0 | 42,227 | 4/8/2022 | |
4.3.0 | 511 | 4/8/2022 | |
4.2.0 | 453,533 | 12/31/2019 | |
4.1.1 | 7,670 | 11/16/2019 | |
4.1.0 | 1,982 | 10/23/2019 | |
3.5.2 | 28,393 | 7/19/2019 | |
3.5.1 | 623 | 7/19/2019 | |
3.5.0 | 635 | 7/19/2019 | |
3.4.1 | 637 | 7/19/2019 | |
3.4.0 | 15,872 | 3/16/2019 | |
3.3.2 | 28,522 | 5/1/2018 | |
3.3.1 | 3,523 | 4/16/2018 | |
3.3.0 | 2,024 | 4/16/2018 | |
3.2.0 | 1,139 | 4/16/2018 | |
3.1.2 | 1,148 | 4/16/2018 | |
3.1.1 | 1,246 | 4/13/2018 | |
3.1.0 | 1,209 | 4/7/2018 | |
3.0.0.3 | 1,741 | 3/20/2018 | |
3.0.0.2 | 1,151 | 3/20/2018 | |
3.0.0.1 | 2,171 | 2/25/2018 | |
3.0.0 | 1,202 | 2/17/2018 | |
2.1.0 | 3,483 | 1/2/2018 | |
2.0.0.1 | 1,540 | 11/23/2017 | |
2.0.0 | 2,675 | 9/20/2017 | |
1.6.0 | 1,197 | 8/15/2017 | |
1.5.0 | 1,141 | 8/13/2017 | |
1.0.1 | 1,296 | 7/25/2017 | |
0.0.0.1 | 1,544 | 7/25/2017 |