Hi Gerv,

Well, I think any security feature/model has to have some properties that are reliable. So CSP may not prevent XSS is the blanket sense, but it still needs to be able to enforce some set of restrictions that the developer can rely upon.

Certainly the language within http://people.mozilla.org/~bsterne/content-security-policy/details.html is unambiguous (i.e. "Scripts from non-white-listed hosts will not be requested or executed", not "Scripts from non-white-listed hosts may or may not be requested or executed"). Thanks,
  Lucas.

On Dec 17, 2008, at 12:23 PM, Gervase Markham wrote:

Lucas Adamski wrote:
From this discussion I'm still seeing good reasons to have a version
flag; mainly to allow servers to detect whether a given client supports
CSP (and what version of it) in an unequivocal manner.

How do you react to my point that they shouldn't need to know that
because, if they do, it means they are relying on CSP, which they
shouldn't be?

If a server is to rely on CSP to reliably enforce security constraints

If it's doing that, it's broken. CSP is explicitly not designed for
this. (As I understand it.)

Gerv
_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to