securityHeaders.class.php 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. <?php
  2. /**
  3. * Classe securityHeaders
  4. *
  5. * Gère les en-têtes HTTP de sécurité
  6. */
  7. class securityHeaders
  8. {
  9. /**
  10. * Applique tous les headers de sécurité recommandés
  11. *
  12. * @param array $options Options de configuration
  13. */
  14. public static function apply(array $options = []): void
  15. {
  16. $defaults = [
  17. 'csp' => true,
  18. 'xframe' => true,
  19. 'xcontent' => true,
  20. 'xss' => true,
  21. 'referrer' => true,
  22. 'hsts' => true,
  23. 'permissions' => true
  24. ];
  25. $options = array_merge($defaults, $options);
  26. // Ne pas envoyer si les headers sont déjà envoyés
  27. if (headers_sent()) {
  28. return;
  29. }
  30. if ($options['xframe']) {
  31. self::setXFrameOptions();
  32. }
  33. if ($options['xcontent']) {
  34. self::setXContentTypeOptions();
  35. }
  36. if ($options['xss']) {
  37. self::setXSSProtection();
  38. }
  39. if ($options['referrer']) {
  40. self::setReferrerPolicy();
  41. }
  42. if ($options['hsts'] && self::isHTTPS()) {
  43. self::setHSTS();
  44. }
  45. if ($options['permissions']) {
  46. self::setPermissionsPolicy();
  47. }
  48. if ($options['csp']) {
  49. self::setCSP();
  50. }
  51. }
  52. /**
  53. * Applique les headers spécifiques pour la page de login
  54. */
  55. public static function applyForLogin(): void
  56. {
  57. if (headers_sent()) {
  58. return;
  59. }
  60. // Headers de base
  61. self::setXFrameOptions('DENY'); // Plus strict pour le login
  62. self::setXContentTypeOptions();
  63. self::setXSSProtection();
  64. self::setReferrerPolicy('no-referrer');
  65. if (self::isHTTPS()) {
  66. self::setHSTS();
  67. }
  68. // CSP strict pour le login
  69. self::setLoginCSP();
  70. // Cache control - Ne pas mettre en cache la page de login
  71. self::setNoCache();
  72. }
  73. /**
  74. * X-Frame-Options : Empêche le clickjacking
  75. *
  76. * @param string $value DENY, SAMEORIGIN, ou ALLOW-FROM uri
  77. */
  78. public static function setXFrameOptions(string $value = 'SAMEORIGIN'): void
  79. {
  80. header("X-Frame-Options: $value");
  81. }
  82. /**
  83. * X-Content-Type-Options : Empêche le MIME sniffing
  84. */
  85. public static function setXContentTypeOptions(): void
  86. {
  87. header('X-Content-Type-Options: nosniff');
  88. }
  89. /**
  90. * X-XSS-Protection : Protection XSS du navigateur (legacy)
  91. */
  92. public static function setXSSProtection(): void
  93. {
  94. header('X-XSS-Protection: 1; mode=block');
  95. }
  96. /**
  97. * Referrer-Policy : Contrôle les informations de referrer
  98. *
  99. * @param string $policy Politique de referrer
  100. */
  101. public static function setReferrerPolicy(string $policy = 'strict-origin-when-cross-origin'): void
  102. {
  103. header("Referrer-Policy: $policy");
  104. }
  105. /**
  106. * Strict-Transport-Security : Force HTTPS
  107. *
  108. * @param int $maxAge Durée en secondes (défaut: 1 an)
  109. * @param bool $includeSubDomains Inclure les sous-domaines
  110. */
  111. public static function setHSTS(int $maxAge = 31536000, bool $includeSubDomains = true): void
  112. {
  113. $header = "Strict-Transport-Security: max-age=$maxAge";
  114. if ($includeSubDomains) {
  115. $header .= '; includeSubDomains';
  116. }
  117. header($header);
  118. }
  119. /**
  120. * Permissions-Policy : Contrôle l'accès aux APIs du navigateur
  121. */
  122. public static function setPermissionsPolicy(): void
  123. {
  124. header("Permissions-Policy: geolocation=(), microphone=(), camera=(), payment=(), usb=()");
  125. }
  126. /**
  127. * Content-Security-Policy : Politique de sécurité du contenu
  128. *
  129. * @param array $directives Directives CSP personnalisées
  130. */
  131. public static function setCSP(array $directives = []): void
  132. {
  133. $defaults = [
  134. "default-src" => "'self'",
  135. "script-src" => "'self' 'unsafe-inline' 'unsafe-eval' https://cdn.jsdelivr.net https://cdnjs.cloudflare.com",
  136. "style-src" => "'self' 'unsafe-inline' https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://fonts.googleapis.com",
  137. "font-src" => "'self' https://fonts.gstatic.com https://cdn.jsdelivr.net https://cdnjs.cloudflare.com",
  138. "img-src" => "'self' data: https:",
  139. "connect-src" => "'self'",
  140. "frame-ancestors" => "'self'",
  141. "form-action" => "'self'",
  142. "base-uri" => "'self'"
  143. ];
  144. $directives = array_merge($defaults, $directives);
  145. $csp = [];
  146. foreach ($directives as $directive => $value) {
  147. $csp[] = "$directive $value";
  148. }
  149. header("Content-Security-Policy: " . implode('; ', $csp));
  150. }
  151. /**
  152. * CSP strict pour la page de login
  153. */
  154. public static function setLoginCSP(): void
  155. {
  156. $nonce = self::generateNonce();
  157. $directives = [
  158. "default-src" => "'self'",
  159. "script-src" => "'self' 'nonce-{$nonce}' https://cdn.jsdelivr.net https://cdnjs.cloudflare.com",
  160. "style-src" => "'self' 'unsafe-inline' https://cdn.jsdelivr.net https://cdnjs.cloudflare.com https://fonts.googleapis.com",
  161. "font-src" => "'self' https://fonts.gstatic.com https://cdn.jsdelivr.net https://cdnjs.cloudflare.com",
  162. "img-src" => "'self' data:",
  163. "connect-src" => "'self'",
  164. "frame-ancestors" => "'none'",
  165. "form-action" => "'self'",
  166. "base-uri" => "'self'",
  167. "object-src" => "'none'"
  168. ];
  169. $csp = [];
  170. foreach ($directives as $directive => $value) {
  171. $csp[] = "$directive $value";
  172. }
  173. header("Content-Security-Policy: " . implode('; ', $csp));
  174. }
  175. /**
  176. * Headers pour désactiver le cache
  177. */
  178. public static function setNoCache(): void
  179. {
  180. header('Cache-Control: no-store, no-cache, must-revalidate, max-age=0');
  181. header('Cache-Control: post-check=0, pre-check=0', false);
  182. header('Pragma: no-cache');
  183. header('Expires: Thu, 01 Jan 1970 00:00:00 GMT');
  184. }
  185. /**
  186. * Génère un nonce pour CSP
  187. *
  188. * @return string Nonce encodé en base64
  189. */
  190. public static function generateNonce(): string
  191. {
  192. if (!isset($_SESSION['csp_nonce'])) {
  193. $_SESSION['csp_nonce'] = base64_encode(random_bytes(16));
  194. }
  195. return $_SESSION['csp_nonce'];
  196. }
  197. /**
  198. * Retourne le nonce actuel pour l'utiliser dans les scripts inline
  199. *
  200. * @return string Nonce pour attribut nonce=""
  201. */
  202. public static function getNonce(): string
  203. {
  204. return $_SESSION['csp_nonce'] ?? self::generateNonce();
  205. }
  206. /**
  207. * Vérifie si la connexion est HTTPS
  208. *
  209. * @return bool
  210. */
  211. private static function isHTTPS(): bool
  212. {
  213. if (isset($_SERVER['HTTPS']) && $_SERVER['HTTPS'] !== 'off') {
  214. return true;
  215. }
  216. if (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) && $_SERVER['HTTP_X_FORWARDED_PROTO'] === 'https') {
  217. return true;
  218. }
  219. if (isset($_SERVER['HTTP_CF_VISITOR'])) {
  220. $visitor = json_decode($_SERVER['HTTP_CF_VISITOR'], true);
  221. if (isset($visitor['scheme']) && $visitor['scheme'] === 'https') {
  222. return true;
  223. }
  224. }
  225. if (isset($_SERVER['SERVER_PORT']) && $_SERVER['SERVER_PORT'] === '443') {
  226. return true;
  227. }
  228. return false;
  229. }
  230. /**
  231. * Applique les headers de sécurité pour les API JSON
  232. */
  233. public static function applyForAPI(): void
  234. {
  235. if (headers_sent()) {
  236. return;
  237. }
  238. header('Content-Type: application/json; charset=utf-8');
  239. self::setXContentTypeOptions();
  240. self::setNoCache();
  241. // CORS si nécessaire
  242. // self::setCORS();
  243. }
  244. /**
  245. * Configure CORS (Cross-Origin Resource Sharing)
  246. *
  247. * @param array $allowedOrigins Origines autorisées
  248. * @param array $allowedMethods Méthodes autorisées
  249. */
  250. public static function setCORS(array $allowedOrigins = [], array $allowedMethods = ['GET', 'POST']): void
  251. {
  252. $origin = $_SERVER['HTTP_ORIGIN'] ?? '';
  253. // Si pas de restriction, n'autoriser que same-origin
  254. if (empty($allowedOrigins)) {
  255. return;
  256. }
  257. if (in_array($origin, $allowedOrigins) || in_array('*', $allowedOrigins)) {
  258. header("Access-Control-Allow-Origin: $origin");
  259. header('Access-Control-Allow-Credentials: true');
  260. header('Access-Control-Allow-Methods: ' . implode(', ', $allowedMethods));
  261. header('Access-Control-Allow-Headers: Content-Type, Authorization, X-CSRF-Token');
  262. }
  263. }
  264. }