We use haproxy version 1.8.16 for our sites. one week ago we saw one site is using our site by means of iframe tag in its site, I think this is a kind of clickjacking. We could stop them with below command in our front end:
rspadd X-Frame-Options:\ SAMEORIGIN
This worked very well and stop them
but we need to except some sites from this. I have found nothing about this issue in internet for haproxy.
Thanks for ur help
X-Frame-Options is a feature implemented in browsers, therefore not pertaining to HAProxy (or any other web-server or load-balancer out there).
However you should have a look at the Mozilla documentation pertaining to this header (they even have an example for HAProxy):
Unfortunately, based on their compatibility matrix, except Firefox (and surprisingly IE), only the
sameorigin option looks to be fully supported by most browsers.
That being said, another alternative is to inject the
X-Frame-Option: deny only when the
Referer request header is different than the domains you want to whitelist. (You should also make sure to configure the
referrerpolicy option of the
All in all, please take into account that the success of any of these measures depends on the browser, and in the end there is nothing that HAProxy (or for that matter any web server out there) can actually do to stop this kind of attacks.
<iframe> and either “escape” from it, or issue an alert to the user, or perhaps even redirect that iframe to a warning page.