> -----Original Message-----
> From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
> Sent: Wednesday, July 18, 2001 12:10
> To:   [EMAIL PROTECTED]
> Subject:      Re: Linux, too, sot of (Windows MS-DOS Device Name DoS
> vulnerabilities) 
> 
> Ishikawa <[EMAIL PROTECTED]> wrote:
> > due to the problems mentioned,
> > we should not forget that a famous browser client on
> > Linux is similarly guilty.
> > 
> > I tried the following URLs with
> > my netscape browser under Linux.
> > 
> >     file:///dev/null
> ...
> >     file:///dev/zero
> ...
> >     file:///dev/pty0
> 
>   A 'stat' of all of these files shows that they are not regular
> files.  There's no reason, them, to open them in the browser.
> 
> > If someone wants to be nasty, he/she can
> > create a web page with
> > URLs inside <IMG SRC="these device files" ....>
> > listing DOS devices as well as these popular UNIX devices.
> 
>   I question the wisdom of browsers which allow external web pages to
> reference local files via 'file://' URLs.
> 
        I agree; that's really the underlying problem.  Checking for special
files is a band-aid fix that also limits flexibility.

        References to 'local' URLs (file: and otherwise) from 'non-local'
documents should at least produce a confirmation dialog.  Beyond that,
configurable policy facilities like those starting to show up in browsers
for cookies etc. would be nice.

> > As someone mentioned, we can't predict what other
> > device files may show up in the future by addition of
> > new hardware drivers.
> 
>   We also cannot predict where special files exist, either.  Placing
> the special file 'zero' in '/dev' is simply an administrative
> convention on many Unix systems.  Device files can exist anywhere.
> 
        On some kernels (HURD, or Linux/*BSD with userfs), normal files can
be equally "magic".

        As a genral principle, regardless of platform, local paths may
encompass more than just 'dumb' files, so following 'remote' references to
them should be restricted.

Reply via email to