WRT DNS rebinding - my initial reaction is that this isn't the proper place to fix this problem; it's not unique by any means to this proposal.

My inclination, then, would be to note DNS rebinding as a risk in Security Considerations that prudent clients can protect themselves against, if necessary.

Luckily, the IETF has mechanisms in place to get security reviews of proposals, so we can avail ourselves of that to get more definitive advice.

Cheers,



On 12/02/2009, at 7:31 AM, Adam Barth wrote:

On Wed, Feb 11, 2009 at 11:52 AM, Eran Hammer-Lahav <e...@hueniverse.com > wrote:
Your approach is wrong. Host-meta should not be trying to address such
security concerns.

Ignoring security problems doesn't make them go away.  It just means
you'll have to pay the piper more later.

Applications making use of it should. There are plenty of
applications where no one care about security. Obviously, crossdomain.xml
needs to be secure, since, well, it is all about that.

What's the point of a central metadata repository that can't handle
the most popular use case of metadata?

An application which strict security requirement should pay attention to the experience you are referring to. We certainly agree on that. But that is
application-specific.

Here's what I recommend:

1) Change the scope of the host-meta to default to the origin of the
URL from which it was retrieved (as computed by the algorithm in
draft-abarth-origin).

2) Let particular applications narrow this scope if they require
additional granularity.

Adam


--
Mark Nottingham     http://www.mnot.net/


Reply via email to