A couple comments:
1. Why for non same-origin requests, are users limited to only setting
"Accept" and "Accept-Language" HTTP headers. Couldn't we allow a larger set
of safe headers to be included? At least one could define a prefixed set of
allowable headers (like users could set headers "Cross-*"). This seems an
excessive restraint and prevents some very useful functionality.
2. Can non-GET access only be granted as a response to user agent OPTION
requests? Is there a reason that servers can't preemptively include access
control headers (including policy path and max age) in GET responses to
grant future non-GET request? Since most non-GET requests will probably be
preceded by GET requests, it seems like user agents could more efficiently
determine access level if prior responses explicity granted access. Of
course, using the OPTION requests as outlined in the WD would still be
appropriate if prior responses (if any) had not granted access.
This second question is not a big deal, the first one is more important to
me. I am sorry if this already been discussed, I couldn't find anything such
discussions in the archives.
Thanks,
Kris
----- Original Message -----
From: "Anne van Kesteren" <[EMAIL PROTECTED]>
To: "WAF WG (public)" <[email protected]>
Sent: Friday, February 15, 2008 7:37 AM
Subject: Access Control for Cross-site Requests WD Published
Hi all,
The WAF WG published a new snapshot of the editor's draft of Access
Control for Cross-site Requests yesterday in the W3C Technical Report
space. It includes recent HTTP header name changes and incorporates a new
proposal for limiting the amount of requests in case of non-GET methods to
various different URIs which share the same origin.
In addition to those technical changes it also makes the (until now)
implicit requirements and use cases explicit by listing them in an
appendix and contains a short FAQ on design decisions.
http://www.w3.org/TR/2008/WD-access-control-20080214/
We expect the next draft to go to Last Call so hereby we're soliciting
input, once again, from the Forms WG, HTML WG, HTTP WG, TAG, Web API WG,
and Web Security Context WG. (All on the "bcc list" so we don't get
massive cross-list e-mailing.)
We appreciate input from anyone however, so feel free to forward or reply
to this e-mail as you see fit.
Kind regards,
--
Anne van Kesteren
<http://annevankesteren.nl/>
<http://www.opera.com/>