On Fri, 27 Jul 2007 01:14:22 +0200, Jonas Sicking <[EMAIL PROTECTED]> wrote:
Anne van Kesteren wrote:
On Mon, 23 Jul 2007 12:37:31 +0200, Jonas Sicking <[EMAIL PROTECTED]> wrote:
First of all I don't like that POST requests can be made unchecked to any url. I do realize that this seems possible already using plain/text encoded forms, but this is possibly something that browsers will need to change.
I'd be fine with giving POST the same treatment as the other methods. What about HEAD though?

I talked about that with a college yesterday. The problem with HEAD is that that would mean that the implementation would not see any PIs in the page. Which is bad if the following PI is in there:

<?access-control deny="*"?>

Fair point. So for anything other than GET a special check will have to be done first.


I propose we instead specify that the DELETE request should be done to the final uri of the redirects in the GET request. And if the DELETE request produces any redirects then those must not be honored.

 I thought this is what the draft specified.

That is not how I read the draft, but it doesn't matter, if we all think that's a good idea then lets do that.

I'll make sure this is clear.


Do other people have an opinion? In general it feels to me like redirects and non-GET requests cross site is a rare edge-case and not something that is particularly important. So we might as well do the safe thing. I could even see disallowing redirects entirely, even for the initial GET request.

 Maybe an access check should be done during each redirect as well?

I don't think that's needed if we make the request to the final redirected uri.

Ok.


I'm also wondering whether XMLHttpRequest-Security-Check (maybe with a different name) and Referer-Root (if needed) should be defined as part of the access-control specification.

I don't feel strongly either way. Currently there is only one way that I know of to make non-GET requests in a browser and try to access the result, and that is XMLHttpRequest. Though this might change in the future.

<form method="POST" target="iframe"> is a way, but that's only for same-origin.


Actually, I wonder if XForms would be another way?

Maybe, but XForms also (like HTML forms) allows for a limited set of methods.


It seems nicer however to not restrict it to XMLHttpRequest and define the entire retrieval algorithm in the access-control specification including how it works for other methods and in face of redirects.

By the way, a request to a same-origin redirect that redirects to a non same-origin resource should also work I suppose? Or is there some reason you need to know in advance you're going to make a non same-origin request?


--
Anne van Kesteren
<http://annevankesteren.nl/>
<http://www.opera.com/>

Reply via email to