Gervase Markham wrote:
>
> Note to readers: Brendan proposed
> <jail hash="34af56...">
> -- untrusted content here --
> </jail hash="34af56...">
Just to be complete, here's what we proposed:
<div class='noexecute' id='foo'></div>
<script>
document.getElementById('foo').innerHTML = "quoted untrusted content";
</script>
A problem with our proposal is that it relies on scripting being
turned on, and if scripting is not turned on you don't see the untrusted
content at all --- even though with scripting turned off it should be
safe. You can have a separate <noscript>, but that means the content
has to be included twice. Also, I would worry then that the untrusted
content could close the <noscript> --- a danger for when scripting is
turned on.
On the other hand, our proposal works with current browsers and was
sufficient to demonstrate the issue.
To be foolproof, the <jail> proposal does need to scan the untrusted
content to ensure that the "hash" is not in the content, this is slightly
more involved than the HTML/JavaScript escaping our proposal requires.
For example, our kind of escaping can be done per-character, you don't
need to see the whole string to escape.
(BTW I think "hash" is a misleading word to use here, unless I am
misunderstanding the details of Brendan's suggestion.)
I would also like to see a full description of <jail>, I think there are
plenty of ways it could go wrong.
At any rate, the idea of a jail/sandbox is the important thing and these
details are not important to our proposal, as long as a jail/sandbox is
available. This is just one of many policies we are interested in
supporting.
> But making it impossible to set it twice adds defence in depth with very
> little downside.
I'm not against it; however it was easier for us not to do it, and I still
don't think it adds much.
> But do you actually have any way to
> make this happen in IE at all? If not, then they'll have to implement it
> themselves, and can do whatever syntax we pick.
I'm totally open to other syntax; but why not make it easy for them to do
something compatible, and save web app developers some trouble? At any
rate, I don't want to get into standards wars.
-Trevor
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security