would it be possible to editreport-uri /opnsense-report-csp-violationso that we don't reveal that we are using opnsense?
also the server: nginxis a bit disturbing, but I am not a web developer and maybe it's needed, I don't know, I am also aware that a nessus / openvas scan will probably detect nginx in any case, still I would avoid to send informations if not mandatory
Quote from: siga75 on October 05, 2019, 11:29:57 amwould it be possible to editreport-uri /opnsense-report-csp-violationso that we don't reveal that we are using opnsense?In theory yes, but needs some changes under the hood to work. On the other hand I do not see any advantage because it is still easy to find out by fingerprinting. For example, the OPNsense nginx supports Brotli (br in the Accept-Encoding header) compression, has branded error pages for WAF etc. so you can always find it out.Quote from: siga75 on October 05, 2019, 11:29:57 amalso the server: nginxis a bit disturbing, but I am not a web developer and maybe it's needed, I don't know, I am also aware that a nessus / openvas scan will probably detect nginx in any case, still I would avoid to send informations if not mandatoryYou can find some background information here: https://tools.ietf.org/html/rfc2616#section-14.38In general I cannot remove the header totally without changing the source code of nginx but I have already configured it in a way to keep it as minimal as possible. It is also common to have it like this. If it would be missing, you could still find out which server it is by the order of the headers (and the implemented features).Almost all web servers are having the same options (only write the name into the header), write header and version and there is also write some debug information in it (for example contain the enabled modules in apache httpd).
Your OPNsense web interface should be restricted to admins on the LAN only.