On Mon, Feb 23, 2009 at 10:13 AM, Breno de Medeiros <br...@google.com> wrote:
> Every application _will_ need to use different processing rules, because,
> well, they are interested in different things.

Applications will be interested in different facts in the host-meta
store, but why should they use different procedures for obtaining the
host-meta store?  They might as well use different stores entirely.

> What is the attack model here? I assume is the following: The attacker
> compromises the server to serve a re-direct when there should be a file
> served (or a 404). Well, the attacker can't upload a host-meta with what it
> wants in it? Why?

Often users can add redirects to a server without the ability to
upload content to that serve.  For example, tinyurl.com/host-meta now
redirects to a URL I control even though I have no ability to upload
content to tinyurl.com.  Why should I be able to set host-meta
properties for tinyurl.com?

> Perhaps that argument would be more convincing when you provide an example
> of an attack made possibly by introduction of a redirect that would not be
> possible by, say, adding a line to the host-meta file.

Ok.  I own tinyurl.com's host-meta store because of redirects.
Without redirects, I don't know how to own their host-meta store.

Adam

Reply via email to