"Gervase Markham" <[EMAIL PROTECTED]> wrote
> You haven't yet established why these zones are necessary.

Zones (like those used in Internet Explorer) are a great and commonly used 
concept of most security and policy models. Imagine the Linux filesystem or 
a firewall without group rights.

Binding rights to a specific entity without a group abstraction (like 
whitelist websites for a specific right like www.mozilla.org -> popups=true) 
is just a configuration nightmare - mainly because complexity explodes 
exponentially with the number of websites and features. Imagine someone 
joins/leaves your company and you need to grant him rights to the 
fileserver, mailserver, 20 application servers by whitelisting him on each? 
Isn't it much more simple to add/remove him to/from the "employee" group and 
that's it?!

Imagine the following situation: You are the webmaster of a huge, worldwide 
company. You are running several intranets and extranetes inside you 
company. Most of them require javascript, a few require popups and a few 
other require preveliged XUL based on codebase principals. You need to 
configure about 300 Domains (30 applications x 10 countries) classified into 
the 4 groups/zones (javascript, popups, preveliged XUL and "internet zone").

Tell me why a website whitelist for each feature is better than creating 4 
zones, granting them the needed rights and then bind the websites to the 
zones? Or why i should harm an intranet website requiring javascript, 
because a security issue in the internet (zone) requires to disable 
javascript for a few days outside of the intranet (currently javascript is a 
global on/off)? Especially when i am not a single user but the administrator 
for 10.000 users running busines critical webbased applications.

Michael



_______________________________________________
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security

Reply via email to