On 19/08/13 15:46, Richard Barnes wrote:
>
>
>
> On Mon, Aug 19, 2013 at 9:38 AM, Richard Barnes <r...@ipv.sx
> <mailto:r...@ipv.sx>> wrote:
>
>
>
>
>     On Fri, Aug 16, 2013 at 7:44 PM, Hill, Brad <bh...@paypal-inc.com
>     <mailto:bh...@paypal-inc.com>> wrote:
>
>         Additional comments inline.
>         ________________________________________
>
>
>         (D3) Shouldn't ALLOW-FROM be followed by an origin, not a URI?
>          In other
>         words, what does it mean to send "X-Frame-Options: ALLOW-FROM
>         https://example.com/this/is/a/path?query#fragment";?
>
>         [Hill, Brad] Agreed.
>
>
>     Great.
>
>      
>
>         (D3) In the ALLOW-FROM: what does "top level context" mean?
>          Do you
>         really mean the top level here, as opposed to the next one up?
>          For
>         example, suppose A loads B in an iframe, and B loads C, and
>         then C sends
>         an X-Frame-Options header with ALLOW-FROM.  Is the ALLOW-FROM
>         origin
>         compared to B or A?  In either case, you should also note the
>         attacks
>         that remain.  For example, if the answer is B, then B needs to use
>         X-Frame-Options as well, or else, A can maliciously frame A
>         within B.  Or
>         if the answer is A, then C is trusting A not to load any malicious
>         intermediate frames B.
>
>         [Hill, Brad]  This really does mean the top/final origin value
>         in a frame ancestor
>         chain walk.  Browsers have implemented X-Frame-Options to
>         check the
>         Origin context that is topmost in the window or tab.  (the
>         _top target,
>         representing the full, original browsing context, not just the
>         immediate
>         parent frame)  This could be clarified perhaps, but is not
>         incorrect.
>
>
>     OK, that's fine.  Could you please just note the risk that an
>     intermediate frame in a nested scenario could do bad things?  For
>     example, in the Security Considerations:
>     """
>     When SAMEORIGIN or ALLOW-FROM values are used, there is some
>     residual risk in nested framing scenarios.  For example, suppose
>     that A loads B in an iframe; B loads C; and C sends an
>     X-Frame-Options header with the value "ALLOW-FROM A".  The browser
>     will allow this setup, because the ALLOW-FROM origin sent by C
>     matches the top-level origin.  However, the intermediate framing
>     page B may still be able to perform clickjacking attacks against
>     A.  Thus, sites using this mechanism should keep in mind that by
>     emitting an X-Frame-Options header with value SAMEORIGIN or
>     ALLOW-FROM, they are not only granting permission to the indicated
>     origin (the same origin, or the ALLOW-FROM origin), but also to
>     any origins included as frames within that origin.
>     """
>
>
> Update: Feel free to ignore this suggestion (or steal text if you
> think it's helpful).  I think Tobias is on the right track with what
> he suggested.  That's what I get for responding to email in
> chronological order :)
>
> --Ricahrd

Dear Richard,
no problem, happens to me, too.
Synchronous and asynchronous processing. ;-)

I will keep the new revised wording in version-10 as is.

Thanks, Tobias


>
>
>  
>
>
>     Thanks,
>     --Richard
>
>
>
>
>
>
> _______________________________________________
> websec mailing list
> websec@ietf.org
> https://www.ietf.org/mailman/listinfo/websec

_______________________________________________
websec mailing list
websec@ietf.org
https://www.ietf.org/mailman/listinfo/websec

Reply via email to