Jenkins plugin to configure Extended Security Settings: a set of additional security settings for Jenkins.
This feature is designed to allow overly paranoid security scanners to certify Jenkins. This adds an autocomplete="off"
attribute to password inputs on the signup and login pages. Note that this feature is generally ignored by modern web browsers due to the inherent insecurity of attempting to prevent password managers from working which encourages weak passwords or bad password management practices (like using sticky notes). See Choosing Secure Passwords for more details.
This feature enables the HTTP header X-XSS-Protection: 1; mode=block
to be sent on all requests which some web browsers intend as a way to automatically block suspected cross-site scripting attacks. Several web browsers (e.g., Firefox, Edge, and Chrome) do not support this header.
This feature adds a configurable list of HTTP header names (case-insensitive) that can be automatically removed from HTTP responses sent to users lacking the Overall/Read permission. This is useful for hiding the Jenkins and other software versions present in HTTP headers like X-Jenkins.
Various security scanning tools recommend hiding version information advertised this way. Note that there are numerous other ways to fingerprint Jenkins to deduce which version is running even when this feature is enabled.
This feature is only provided for basic HTTP header removal. For more complex header rewrite rules, using a reverse proxy such as Apache with mod_headers is a more complete solution. Use of a reverse proxy in front of Jenkins is generally recommended in order to more easily support HTTPS and allow for additional security hardening through the reverse proxy itself. Many popular reverse proxies and HTTP load balancers support some form of response filtering, so consult the relevant documentation for those products on how to filter HTTP headers.
General information about running Jenkins behind Apache are provided on the Jenkins wiki. To filter out version headers, an Apache config snippet like this can be used:
<IfModule headers>
Header unset Server
Header unset X-Jenkins
</IfModule>
Note that Apache will subsequently advertise its own Server
header which can be further customized via the ServerTokens
directive. Keep in mind their warning:
Setting
ServerTokens
to less thanminimal
is not recommended because it makes it more difficult to debug interoperational problems. Also note that disabling the Server: header does nothing at all to make your server more secure. The idea of "security through obscurity" is a myth and leads to a false sense of safety.
Check out the releases page for the changelog.