On Mar 17, 2008, at 7:52 PM, Sunava Dutta wrote:
Maciej Stachowiak [EMAIL PROTECTED] noted:
<<I think encouraging more content sniffing of text/plain on the
server side is likely to increase, not reduce attack surface.>>
If a service is defined as accepting one format, it need only accept
that format, and can reject anything else. Sniffing is not
recommended or desirable.
Such a service should reject an incorrect MIME type, which text/plain
would be for XML.
Remember, even if you allow the Content-Type to be specified by the
caller, the server has NO guarantee that the Content-Type specified
is an accurate description of the POST body content. To remain
secure, servers MUST be robust in the face of malformed input.
However, sniffing in text/plain is a whole different ball of wax.
Maciej Stachowiak [EMAIL PROTECTED] noted:
<<So far I have not heard any *specific* security risks of the
Access- Control model as compared to XDR, at least none that have
held up to closer scrutiny. Is Microsoft aware of any specific such
risks, as opposed to general concerns?>>
The Security Worries section here: http://wiki.mozilla.org/Cross_Site_XMLHttpRequest
and the Security section here:http://www.w3.org/TR/access-control/#security
describe some of the concerns related to the Access-Control
model. We believe that the XDR model effectively mitigates the
concerns described.
Do you have any specifics? Which of those items, in particular, do you
think represent security vulnerabilities in XHR2+AC? Which are
addressed by XDR? I can do this analysis myself if necessary, but if
Microsoft is making the claim that XDR is more secure and that you
believe XHR2+AC has security vulnerabilities, I think you should
provide specific evidence to back up these claims.
(Note that these are both lists of issues that are believed to be
adequately addressed, so it is not immediately obvious which items you
believe are vulnerabilities.)
Maciej Stachowiak [EMAIL PROTECTED] noted:
<<Certainly simplicity of client-side authoring, server-side
authoring and implementation are worth discussing as well, but I
think the approaches are similar enough that simplicity in itself is
not a major security issue.>>
While simplicity alone obviously is no guarantee of security, design
complexity almost always leads to implementation bugs.
Implementation bugs in access control mechanisms lead to security
bugs.
That is true. But based on my experience writing the original
implementation of XMLHttpRequest for WebKit, and my review of the
spec, I do not think XHR2+AC rises to the level of complexity that is
highly likely to lead to implementation bugs.
Regards,
Maciej