Thomas Roessler <[EMAIL PROTECTED]> wrote on 04/14/2008 08:21:50 AM:

> On 2008-04-14 08:07:10 -0700, Jon Ferraiolo wrote:
>
> > On the architecture side, Access Control is just plain wrong,
> > with the PEP on the client instead of the server, which requires
> > data to be sent along the pipe to the client, where the client is
> > trusted to discard the data if the user isn't allowed to see the
> > data; it is just plain architecturally wrong to transmit data
> > that is not meant to be seen.
>
> This seems to confuse the attacker model a bit.  It's not about the
> user not being permitted to see the data, it's about a web
> application from a different origin not being allowed to manipulate
> the data, even though the user is allowed to see the data.

The comment in question wasn't about CSRF or other data-setting attacks on
a server, but instead about how it is architecturally wrong to send data
that ultimately will be thrown out when it reaches the client. If I was
outside of the standards world and wrote some code that did this, I would
be embarrassed to show such an implementation during a code walkthrough.
The policy check should be done before the data is transmitted.

Jon

Reply via email to