Learn F5 Technologies, Get Answers & Share Community Solutions Join DevCentral

Filter by:
  • Solution
  • Technology
code share

Security Headers Insertion

Problem this snippet solves:

Centralize the security header management for one or more domains on the recommendation of SecurityHeaders.io.

Be warned!! You can really do damage to your availability if you do not understand these headers and their implications to your client browsers, make sure your header values are tested and vetted before applying to any production traffic.

Background on the headers:

How to use this snippet:

apply this iRule to your virtual servers, once customized for your environment.

Tested on Version:
12.0
Comments on this Snippet
Comment made 18-Mar-2016 by DJDX21 122
If the headers are already present in case of HSTS or Content security policy one can override with the new header by removing the old header Like this: ~~~ when HTTP_RESPONSE { set strictTransportSecurityHeader {"Strict-Transport-Security"} if { [HTTP::header exists $strictTransportSecurityHeader] } { HTTP::header remove $strictTransportSecurityHeader } HTTP::header insert Strict-Transport-Security "max-age=31536000; includeSubDomains" } ~~~
0
Comment made 21-Mar-2016 by Jason Rahm
yep, you can remove and insert, or a replace instead.
0
Comment made 24-Aug-2017 by vince2010091 0

Good stuff

0
Comment made 17-Nov-2017 by magnus78 88

Are these possible to insert on APM Webtops? edit added a working irule for this on apm 13.0.

when HTTP_RESPONSE { if {!( [HTTP::header "X-XSS-Protection"] eq "1; mode=block") }{ HTTP::header replace X-XSS-Protection "1; mode=block" }

if {!( [HTTP::header "X-Content-Type-Options"] eq "nosniff") }{
    HTTP::header replace X-Content-Type-Options "nosniff"
}
if {!( [HTTP::header "Content-Security-Policy"] eq "frame-ancestors *;script-src 'self' 'unsafe-inline' 'unsafe-eval' ; style-src 'self' 'unsafe-inline' ; img-src 'self' data: ; connect-src 'self' wss:;") }{
    HTTP::header replace Content-Security-Policy "frame-ancestors *;script-src 'self' 'unsafe-inline' 'unsafe-eval' ; style-src 'self' 'unsafe-inline' ; img-src 'self' data: ; connect-src 'self' wss:;"
}

log local0. "irule working"

}

0
Comment made 24-Jan-2018 by AlexDeMarco 243

What is the purpose of having this: when HTTP_REQUEST { HTTP::respond 301 Location "https://[HTTP::host][HTTP::uri]" }

0
Comment made 24-Jan-2018 by waleed osama 117

I'm really interested to know why the 301 is needed as well, someone please respond if you have any idea

0
Comment made 24-Jan-2018 by Jason Rahm

The 301 should really be only for requests to the http vip. Including the explicit redirect to ssl is considered best practice for capturing the first (pre-hsts-enabled) request.

0
Comment made 24-Jan-2018 by waleed osama 117

Hi Jason I have a question on HSTS. Isnt it useless on F5 since it won't serve any non https requests anyway on the VS?

0
Comment made 24-Jan-2018 by Jason Rahm

HSTS isn't a helpful server-side setting anyway, it's a client-side protection you enable on the server-side.

0
Comment made 09-Mar-2018 by Mohanad33 160

Image Text

i Tried this but not worked

0
Comment made 09-May-2018 by James Gill 0

Think your problem might be simply changing "when HTTP_REQUEST" to "when HTTP_RESPONSE"

Hope this helps.

0
Comment made 13-May-2018 by Mohanad33 160

Thanks, James, the syntax should be:

X-Content-Type-Options: nosniff

X-XSS-Protection: 1; mode=block

X-Frame-Options: SAMEORIGIN

Strict-Transport-Security: max-age=16070400

content-security-policy: options and value

0
Comment made 16-May-2018 by P.Kueppers 10

I would recommend this to be done over Policies instead of iRules. Simply go to Local Traffic -> Policies and create a new Policy. From there you can add multiple rules in one policy like something like that:

Image Text Image Text

It used less cpu ressources that iRules and is a bit easier to set up.

0
Comment made 30-May-2018 by Arun LK 106

Could you forward the polocies for all the headers shown in the list. Please.

0
Comment made 05-Jun-2018 by P.Kueppers 10

Sorry for the late answer. Thats not a big deal. You should read a bit about the headers and take your favorite option and write them as same as the example rule above.

But I took a few screenshots ;-)

Insert only if not matched: Image Text Insert All Traffic: Image Text Insert only if not matched: Image Text

0
Comment made 11-Jun-2018 by Arun LK 106

Hi Kueppers,

Could you assist with Strict-Transport-Security. AM not able to achieve it. Also, any links to headers would be much appreciated.

Thanks, Arun.

0
Comment made 2 months ago by P.Kueppers 10

Hi Arun,

Im so sorry Im replying so late. I didnt get a notification :(

We are not using the Header for STS. But from the example in the first post do something like:

"Match all of the following conditions": ALL

"Do the following": "Insert" - "http header" - named: "Strict-Transport-Security" with value "max-age=$static::max_age; includeSubDomains"

This should work.

Infos: https://www.keycdn.com/blog/http-security-headers/

0
Comment made 2 months ago by Nagesh08 0

Hi Jason,

After using the above irule in our APM, we are facing the issues. Where users are not able to connect VPN. If i remove the I rule it starts working.

Using the above irule is fixing my security header vulnerability issues reported by qualys, but creating VPN issues. How can I overcome this situation?

0
Comment made 2 months ago by Jason Rahm

Hi Nagesh08, ask a question in Q&A and post the entirety of your iRule there. If not modified for your personal environment, and especially with APM considerations, I wouldn't anticipate it would be a clean drop and insert.

0
Comment made 1 month ago by Nagesh08 0

Hi Jason,

code is as same as above,

when RULE_INIT { set static::fqdn_pin1 "X3pGTSOuJeEVw989IJ/cEtXUEmy52zs1TZQrU06KUKg=" set static::fqdn_pin2 "MHJYVThihUrJcxW6wcqyOISTXIsInsdj3xK8QrZbHec=" set static::max_age 15552000 } when HTTP_REQUEST { HTTP::respond 301 Location "https://[HTTP::host][HTTP::uri]" } when HTTP_RESPONSE { #HSTS HTTP::header insert Strict-Transport-Security "max-age=$static::max_age; includeSubDomains" #HPKP HTTP::header insert Public-Key-Pins "pin-sha256=\"$static::fqdn_pin1\" max-age=$static::max_age; includeSubDomains" #X-XSS-Protection HTTP::header insert X-XSS-Protection "1; mode=block" #X-Frame-Options HTTP::header insert X-Frame-Options "DENY" #X-Content-Type-Options HTTP::header insert X-Content-Type-Options "nosniff" #CSP HTTP::header insert Content-Security-Policy "default-src https://devcentral.f5.com:443"; #CSP for IE HTTP::header insert X-Content-Security-Policy "default-src https://devcentral.f5.com:443"; }

As i found the code here, i am seeking your help.

Thank you

0