Re: Content Security Policy feedback

2008-11-21 Thread Bil Corry
On Nov 20, 4:37 pm, bsterne [EMAIL PROTECTED] wrote: On Nov 17, 2:19 pm, Bil Corry [EMAIL PROTECTED] wrote: (1) Something that appears to be missing from the spec is a way for the browser to advertise to the server that it will support Content Security Policy, possibly with the CSP version

Re: Content Security Policy feedback

2008-12-01 Thread Bil Corry
On Nov 22, 2:03 pm, Lucas Adamski [EMAIL PROTECTED] wrote: Yes, my understanding is that Access Control is actually intended as a generic cross-site server policy mechanism, and XHR is just its first implementation. Anne confirmed that it's not intended to be XHR-only, however it's not

Re: Content Security Policy feedback

2008-12-03 Thread Bil Corry
Gervase Markham wrote on 12/3/2008 4:56 PM: bsterne wrote: I think what Lucas is saying is that servers won't send policy to clients who don't announce that they support CSP. To save 60 bytes in a header? No, so that in the event CSPv2 is incompatible with CSPv1, it won't require two

Re: HTTPOnly cookies specification

2008-12-12 Thread Bil Corry
Gervase Markham wrote on 12/12/2008 11:23 AM: Bil Corry wrote: There's a group of us working on creating a spec for HTTPOnly cookies. This isn't being done by WHAT-WG, then? If you have an active interest in participating, our list is here: http://groups.google.com/group/ietf

Re: Firefox extensions updated over plain HTTP (not HTTPS)

2009-01-04 Thread Bil Corry
Justin Dolske wrote on 1/4/2009 9:48 PM: The update check, which happens over SSL, includes a hash in the reply. When the update is then downloaded (without SSL), the data is checked against the hash from the update check. If the data was tampered with, the hash won't match and the bad update

Re: Content Security Policy feedback

2009-01-12 Thread Bil Corry
Sid Stamm wrote on 1/12/2009 12:52 PM: Or do we want phone-home features for CSP so the browser will automatically tell a site when its policy is violated? It already has this feature, see #6: http://people.mozilla.org/~bsterne/content-security-policy/details.html - Bil

Re: Content Security Policy - final call for comments

2009-04-07 Thread Bil Corry
Gervase Markham wrote on 4/7/2009 6:07 AM: On 07/04/09 07:36, Daniel Veditz wrote: Maybe this does point out the need for some kind of version number in the header, so future browsers can take appropriate action when encountering an old header. For example, assuming none for any newly added

Re: Content Security Policy - final call for comments

2009-04-07 Thread Bil Corry
Brandon Sterne wrote on 4/7/2009 12:02 PM: I looked at each of the HTTP Header Field Definitions and my preference for communicating the CSP version is to add a product token [1] to the User-Agent [2] string. This would add only a few bytes to the U-A and it saves us the trouble of having to

Re: Content Security Policy - final call for comments

2009-04-08 Thread Bil Corry
Gervase Markham wrote on 4/8/2009 2:07 PM: On 07/04/09 18:02, Brandon Sterne wrote: I'm actually against making it easy for servers to detect if CSP is supported, because if we make it particularly easy, content authors will start relying on it as their only defence rather than using it as a

Re: Security Question: Tabs sharing session information, etc...

2009-05-17 Thread Bil Corry
Boris Zbarsky wrote on 5/16/2009 8:21 PM: Why haven't browsers (such as FireFox) isolated tabs/windows from each other such that I cannot simply replicate a logged-in user by simply pasting into another FF tab? For what it's worth, some sites do in fact prevent this (not sure which

Re: XSRF via CSP policy-uri

2009-06-23 Thread Bil Corry
Serge van den Boom wrote on 6/23/2009 3:48 PM: On 2009-06-23, Bil Corry b...@corry.biz wrote: Serge van den Boom wrote on 6/23/2009 8:13 AM: However, by injecting an X-Content-Security-Policy header with the policy-uri set to the vulnerable URL, the web client can be tricked into visiting

Re: Content Security Policy discussion (link)

2009-06-26 Thread Bil Corry
Sid Stamm wrote on 6/26/2009 11:44 AM: Some discussion about CSP has recently popped up on the mozilla wiki: https://wiki.mozilla.org/Talk:Security/CSP/Spec I'm posting the link here in case anyone interested hasn't seen it yet. Comments are welcomed (both here and there). It's been

Re: Content Security Policy - final call for comments

2009-06-30 Thread Bil Corry
One option is to meet in the middle: by default the meta tag is disabled, but the hosting provider can enable it via the X-Content-Security-Policy header; that way those who want the risk of it can still choose to use it. Otherwise, +1 for removing meta tag support. - Bil Brandon Sterne

Re: Content Security Policy - Relaxed Restrictions Mode(s)

2009-07-01 Thread Bil Corry
FunkyRes wrote on 7/1/2009 5:43 AM: A library of function examples that do things cross platform in a fully CSP compliant way would be a godsend, and IMHO preferable to taking the easy way out and loosening up the enforcement. I personally use jQuery to abstract the cross-platform issues:

Re: Comments on the Content Security Policy specification

2009-07-16 Thread Bil Corry
Ian Hickson wrote on 7/16/2009 5:51 AM: I think that this complexity, combined with the tendency for authors to rely on features they think are solvign their problems, would actually lead to authors writing policy files in what would externally appear to be a random fashion, changing them

Re: Content Security Policy updates

2009-07-23 Thread Bil Corry
Daniel Veditz wrote on 7/23/2009 10:32 AM: Sid has updated the Content Security Policy spec to address some of the issues discussed here. https://wiki.mozilla.org/Security/CSP/Spec Under Policy Refinements with a Multiply-Specified Header there is a misspelling of X-Content-SecurityPolicy.

Re: Content Security Policy updates

2009-07-23 Thread Bil Corry
Sid Stamm wrote on 7/23/2009 11:41 AM: On 7/23/09 9:36 AM, Bil Corry wrote: And that section conflicts with what is said earlier in the document, specifically: When multiple instances of the X-Content-SecurityPolicy HTTP header are present in an HTTP response, the intersection

dns-prefetch

2009-07-23 Thread Bil Corry
In [1], it's mentioned that: Furthermore, as a security measure, prefetching of embedded link hostnames is not done from documents loaded over https. If you want to allow it in that context too, just set the preference network.dns.disablePrefetchFromHTTPS to true. Can someone explain the

Re: dns-prefetch

2009-07-23 Thread Bil Corry
Wan-Teh Chang wrote on 7/23/2009 9:29 PM: On Thu, Jul 23, 2009 at 7:10 PM, Bil Corryb...@corry.biz wrote: Can someone explain the security concerns with DNS prefetching from a HTTPS site? The concern is privacy. Prefetching DNS for host names referenced in an HTTPS page leaks some info

Re: dns-prefetch

2009-07-24 Thread Bil Corry
Johnathan Nightingale wrote on 7/24/2009 9:26 AM: On regular http connections, this kind of disclosure is obviously inevitable since the page contents themselves are visible to eavesdroppers, but when the connection is over https, there is a reasonable expectation of some privacy, so we try

Re: dns-prefetch

2009-07-24 Thread Bil Corry
Jean-Marc Desperrier wrote on 7/24/2009 1:09 PM: The most serious attack seem to me to be than the attacker can know *when* exactly you read any given mail. I hadn't thought of that, but I do now see that as a reason to turn it off entirely for any messaging application. You're right, it

Re: Autoconfig ISP fetch security review

2009-11-05 Thread Bil Corry
Gervase Markham wrote on 11/5/2009 2:00 AM: On 05/11/09 04:58, Bil Corry wrote: You may want to consider registering a /.well-known/ path for this, which it seems perfectly suited for: http://tools.ietf.org/html/draft-nottingham-site-meta That draft seems like a let's make the best

logout rel extension

2009-11-24 Thread Bil Corry
Some time ago on the HTML5 list[1], I brought up the problem that there wasn't a straightforward way for a server to determine when the user had closed all windows/tabs. We eventually came up with the idea of using a rel extension[2] to specify a logout feature[3]; the browser pings the server

Re: logout rel extension

2009-11-26 Thread Bil Corry
Justin Dolske wrote on 11/24/2009 10:33 PM: On 11/24/09 12:16 AM, Bil Corry wrote: We eventually came up with the idea of using a rel extension[2] to specify a logout feature[3]; the browser pings the server when all related windows/tabs are closed. I'm not sure if the when all related

Re: Firefox Add-ons

2010-02-08 Thread Bil Corry
/Security_best_practices_in_extensions https://addons.mozilla.org/en-US/developers/docs/policies https://addons.mozilla.org/en-US/developers/docs/policies/reviews -Sid On 2/7/10 10:02 AM, Bil Corry wrote: Eddy Nigg wrote on 2/6/2010 7:04 AM: Isn't it about time that extensions and applications get signed with verified

Re: Allow CSP on HTML meta tags

2010-02-28 Thread Bil Corry
Axel Dahmen wrote on 2/28/2010 5:28 AM: I've read through the CSP specs (https://wiki.mozilla.org/Security/CSP/Spec#Source_Expression_List) and the Talk (https://wiki.mozilla.org/Talk:Security/CSP/Spec)... What I'm missing is a statement about allowing CSP directives in HTML meta tags.

CSP: MUST not or MUST NOT?

2010-06-12 Thread Bil Corry
Perhaps I've been hanging around the IETF lists too long, but shouldn't all of the MUST not in the CSP spec really be MUST NOT? http://www.ietf.org/rfc/rfc2119.txt - Bil ___ dev-security mailing list dev-security@lists.mozilla.org

Re: App Tabs in Firefox 4

2010-06-27 Thread Bil Corry
Sid Stamm wrote on 6/25/2010 12:17 PM: Once it is an app tab, any links directing the user off the site will open in a new standard tab, so that the user won't be switching top-level document domains in the app tab. A couple of years back, I had a similar idea I called pinned tabs [1], but

Re: Banned on MDN for adding referer warnings, please help.

2018-10-08 Thread Bil Corry
On Mon, Oct 8, 2018 at 3:23 PM R0b0t1 wrote: > If they did ban him with no warning for proposing a feature(?) then I > think it is worth mentioning. There have been other very strange > executive decisions that I think need discussed as well, mostly > related to how ads are served in Firefox,

Re: Banned on MDN for adding referer warnings, please help.

2018-10-08 Thread Bil Corry
Hi Mark, Wow, there's a lot to unpack in this email thread. I'm not clear what you're asking for, I think you want community support to add back in your warning banners regarding referrer privacy issues. If so, please send a new email to the community asking for opinions about adding a warning