The existing point 3.5 I think is different from point 7.

Point 3.5 says that AC should be configureable on a resource by resource basis. Point 7 is there to A) allow the server administrator to have the final word, and B) to give a quick way of disabling all cross site access in case AC has been wrongly configured for a set of resources, without having to shut down whole the server.

This clarification would be good to add. So something like

7.
It should be possible for the administrator of the server to disable cross site requests to any resource of the server. This should be easily doable on servers currently deployed using currently existing tools.

This will give the server administrator a quick way to disable cross site access to all resources on the server in case AC has been wrongly configured for some set of resources, without having to shut down whole the server.

It also gives the server administrator the final word in cross site access to all resources on the server.

/ Jonas

Arthur Barstow wrote:

Jonas, All,

Thanks for this input.

I think we should add all of them to section 3. of the UC+Reqs doc in [1] and delete 3.3, 3.4 and 3.6 since they are covered your proposed requirements #1, #2 and #3

Do you consider 3.5 covered by your #7 or some other requirement in your proposal? If yes, then 3.5 should also be deleted.

Regards, Art Barstow
---

[1] <http://dev.w3.org/cvsweb/2006/waf/access-control/>


On Jan 17, 2008, at 1:56 AM, ext Jonas Sicking wrote:


Here are the first round of requirements that I had. Looking forward to input.

1.
Must not require content authors or site maintainers to implement new or
additional security protections to preserve their existing level of
security protection. (Stolen from Brad Porter)

2.
Must be deployable to existing, commonly used, servers without requiring actions by the server administrator in a typical configuration.

3.
Must able to easily deploy support for cross site GET requests. This includes not having to use server side scripting (such as PHP, ASP, or CGI) in a typical server configuration.

4.
It should be possible to put the resource that is made available cross
site in its normal format on the server. It should be possible
to use normal development tools to interact with the resource directly
on the server. I.e. it should not be needed to repackage or reformat the resource just to make it possible to load from other servers.

5.
Content of any type should be possible to distribute. I.e. we should not
limit ourselves to content of a particular type.

6.
It should be possible to allow only specific servers, or sets of servers
to fetch the resource.

7.
It should be possible for the administrator of the server to disable
requests to any resource of the server. This should be easily doable on
servers currently deployed using currently existing tools.

8.
It should be possible to use resources on other servers using the same methods currently used to load resources. For example the following examples should be possible:

<?xml-stylesheet type="text/xsl" href="http://other.server/file.xsl";?>

<?xbl href="http://other.server/xbl.xml";?>

xhr = new XMLHttpRequest;
xhr.open("GET", "http://other.server/data.text";);
xhr.send();

9.
It should be possible to issue methods other than GET to the server, such as POST and DELETE.

10.
Should be possible to use normal authentication mechanisms on the server where the resource is located. I.e. on an IIS server where authentication and session management is generally done by the server before ASP pages execute this should be doable also for requests coming from other servers. Same thing applies to PHP on apache.

/ Jonas





Reply via email to