On 29/07/09 23:23, Ian Hickson wrote:
  * Remove external policy files.

I'm not sure how that's a significant simplification; the syntax is exactly the same just with an extra level of indirection, and if that makes things too complicated for you, don't use them.

  * Remove<meta>  policies.

Done.

  * If there are multiple headers, fail to fully closed.

How is this a simplification? It means that if there are multiple people (e.g. an ISP and their customer) who want input into the policy, the ISP or the customer has to manually merge and intersect the policies to make one header, rather than the browser doing it. In other words, the intersection code gets written 1000 times, often badly, rather than once, hopefully right.

  * Combine img-src, media-src, object-src, frame-src

But then the combined lotsofthings-src would have to be set to the intersection of all the above, which means e.g. far more potential sources of objects (in particular) than you might otherwise want. "object-src: none" sounds to me like a great idea for a load of sites which also want to display images.

OTOH, "lotsofthings-src: host1.com host2.com host3.com" would still be a big improvement over now, where we effectively have "lotsofthings-src: all".

  * Combine style-src and font-src

That makes sense.

  * Drop the "allow" directive, default all the directives to "self"

That's an interesting idea.

  * Move "inline" and "eval" keywords from "script-src" to a separate
    directive, so that all the -src directives have the same syntax

Yes, we've done this.

I'm concerned that people will eventually do something that causes the
entire policy to be ignored, and not realise it ("yay, I fixed the
problem") or will do something that other people will then copy and paste
without understanding ("well this policy worked for that site... yay, now
I'm secure").

These would be issues with any possible formulation.

I imagine sites starting with the simplest policy, e.g. "allow self",
and then progressively adding policy as required to let the site
function properly.  This will result in more-or-less minimal policies
being developed, which is obviously best from a security perspective.

This is maybe how competentely written sites will do it. It's not how most
sites will do it.

How do you expect them to do it? Start with "allow all"? That's like saying "some people will start their Ruby on Rails web application by writing it full of XSS holes, and then try and remove them later". This may be true, but we don't blame Ruby on Rails. Do we?

You are assuming the person reading all this is familiar with security
concepts, with Web technologies, with "whitelists" and wildcards and so
on. This is a fundamentally flawed assumption.

I don't see how we could change CSP to make it understandable to people unfamiliar with Web technologies and wildcards. I think almost everyone is familiar with the concept of a whitelist, but perhaps under a different name. Any suggestions?

Seatbelts are simple to understand. Make CSP as simple as seatbelts and
I'll agree.

Ah, the magic "fix my security problems" header. Why didn't we think of implementing that before?

Make the BNF that defines the syntax be something that matches all
possible strings.
<snip>

This is great. We should do this.

Gerv
_______________________________________________
dev-security mailing list
dev-security@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-security

Reply via email to