Ian Hickson wrote:
On Thu, 14 Feb 2008, John Panzer wrote:
Ian Hickson wrote:
On Thu, 14 Feb 2008, John Panzer wrote:
Right, I'm not talking about Access-Control, I'm talking about general HTTP auth[nz]. I don't understand the rationale for AC4CSR's policies with regard to the Authorization: header
The rationale is really as simple as this: browser vendors don't want to enable a distributed user credentials search.
Which could be accomplished by banning Authorization: Basic and Authorization: Digest only.

Unless there's some other scheme in use that's also vulnerable.
Sure, but one could make the same argument about nonstandard schemes for any header and any query parameter.

It also wouldn't help in general with XMLHttpRequest, since that blocks the Authorization: header because it can get set by the user agent due to the user being authenticated with that site.
For non-CSR XHR, that's not the case in practice or in proposed spec, right? "UAs /MUST/ set the |Authorization| header according to the values passed to the |open() <http://www.w3.org/TR/2006/WD-XMLHttpRequest-20060405/#dfn-open>| method (but /MUST/ allow calls to |setRequestHeader() <http://www.w3.org/TR/2006/WD-XMLHttpRequest-20060405/#dfn-setrequestheader>| to append values to it). --http://www.w3.org/TR/2006/WD-XMLHttpRequest-20060405/

So technically it wouldn't be blocked, except of course every header is blocked which is a separate topic on another thread.

This would only really be useful though if Authorization: is allowed to convey authorization in addition to authentication. Since is used for authorization in addition to authentication today in practice (AuthSub, Amazon AWS, OAuth), I'm worried there's a mismatch between what's done in the field and what the specification calls for, which is resulting in conflicts.

John





Reply via email to