On Monday, 12 August 2013 11:27:59 UTC+3, ianG  wrote:
> The only 'solution' is really to put everything into the secure side.

Unfortunately, I cannot control everything. I'm authoring a kind of CMS system 
for educational use and I need to support user authored content. The whole 
system uses only HTTPS connections for everything and the only thing that I 
need is ability to say

  <iframe isolation="sandbox" src="url-encoded-user-input">

where the "isolation" says that I want to keep this stuff in a sandbox and, 
yes, I truly want to embed untrusted content in this box but I never want it to 
interact with the main document in the any way. (Imagine a iframe pointing to 
youtube.com where youtube.com would not support HTTPS connections...)

As far as I can tell, there's no way to escape that iframe even without the 
missing "isolation" parameter as long as the sandboxed content comes from 
different domain. As a result, that 3rd party HTTP content cannot mess with the 
secure site.

Unfortunately, that does not fit the "Passive Mixed Content" description of 
Firefox. I understand being cautious with <script src="http://...";> but iframes
are totally different, unless I've misunderstood something seriously 
incorrectly.

Note that the problem is that the content to be embedded within an iframe is 
hosted by 3rd party that is not ready to jump to using HTTPS. Because of this, 
my service would need to reduce the security to allow everything to work! And 
this is supposed to improve end user security how?

Perhaps we need support for <iframe trustmeiknowwhatido=1 src="http://...";> 
when using HTTPS connections?

-- 
Mikko
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to