Yep, it's definitely not a perfect solution. A site operator who's willing to 
concede subdomain control through DNS to a third party provider will definitely 
be able to work around origin checks. We could try to combat this by, say, 
resolving domain names to IPs and then blocking those -- but that has its own 
issues.

Many security and privacy problems exhibit arms race qualities. For instance, 
email spam is at something like 80-90% of all mail. I doubt anyone would make 
the argument that we should therefore give up on spam fighting because the 
problem will never be completely solved.

Thanks,
Monica

----- Original Message -----
> ---------- Forwarded message ----------
> From: Brad Hill <[email protected]>
> Date: Mon, Nov 10, 2014 at 3:53 PM
> Subject: Re: [webappsec] Rechartering: Sub-Origins
> To: Brian Smith <[email protected]>
> Cc: "[email protected]" <[email protected]>
> 
> 
> I guess that is a (likely unintended) consequence of the feature.
> 
> Adversarial blocking tools like this are always going to lead to an
> arms race / cat-and-mouse / pick your metaphor for neverending
> game-theoretic churn.  Once there's enough money at stake, the
> decision to take the risk will probably be made, with or without good
> mitigation technologies available. Do we want to sacrifice the ability
> to more easily partition applications in to securable components for a
> position in that battle that will surely be overrun anyway?
> 
> -Brad
> 
> On Mon, Nov 10, 2014 at 3:36 PM, Brian Smith <[email protected]> wrote:
> > On Sun, Nov 9, 2014 at 4:04 PM, Brad Hill <[email protected]> wrote:
> >> Rechartering Thread 5: Sub-Origins
> >>
> >> Based on our survey results and discussion at TPAC, there is strong
> >> consensus for supporting work on a sub-origin proposal based on the
> >> following input document:
> >>
> >> http://www.chromium.org/developers/design-documents/per-page-suborigins
> >>
> >> Joel Weinberger would be editor.
> >
> > Hi,
> >
> > I'd like to make sure I understand this correctly.
> >
> > Let's say there were a popular search engine at
> > https://centillion.example.com that uses <script
> > src=https://tripletap.example.com/insert-ad.js";> to insert an ad into
> > the page. Let's say that ad-blocking tools know to block all requests
> > to tripletap.example.com so the ads won't show up.
> > centillion.example.com could avoid the ad blocking (or at least make
> > it much more difficult) by loading the ads from its own domain
> > https://centillion.example.com instead, but it doesn't do so currently
> > because that would eliminate the protection that same-origin policy
> > provides, causing undue risk. But, with this proposal,
> > https://centillion.example.com could safely serve the ads that it
> > would normally serve https://tripletap.example.com and keep the
> > protections of same-origin policy, while still making ad-blocking
> > difficult.
> >
> > In particular, tools like Mozilla's just-announced-today tracking
> > protection depend on being able to completely avoid making a request
> > to a tracking service, but with the suborigin proposal, it wouldn't
> > even know the suborigin until it received the response to the request
> > that it is trying to avoid making.
> >
> > Is this correct?
> >
> > Cheers,
> > Brian
> 
_______________________________________________
dev-privacy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-privacy

Reply via email to