Bjoern Hoehrmann wrote:
* Jonas Sicking wrote:
My concern is that there might be servers, or server addons that add support for features that we or the server admin isn't thinking of.

I think we can take for granted that there are along with the bad conse-
quences that you are concerned about. But existential qualification does
not help deciding whether adding the proposed feature is worth its cost.
Compare your proposal here with your proposal to the directory traversal
problem in your other issue. How do you arrive here at the conclusion we
need header opt-in, but there at the conclusion, filtering out "../" is
good enough? It would be easier to follow you if you'd say neither risk
is acceptable (and if there was a complete proposal for this feature so
we can properly evaluate cost of adding it).

I agree that the rules are fuzzy. Though I think there is no way to avoid that given the problem I'm trying to address. It is completely impossible to create a security spec such that no-one will get it wrong. All we can do is to reduce the risk that that will happen.

I don't unfortunately have any data on how many servers there are out there with support for headers and/or methods that would result in security breaches. I also have no idea how to get data on that.

I also don't have data on how many servers resolve URIs to file names such that what appears as a subdirectory to the URI rfcs will map to a parent file on the server. There is a little bit of data to go on here though. Adobes crossdomain.xml file did allow for granting access to only part of a uri space. The one problem I have heard of there is the "..\" problem with some servers (which at least includes some versons of IIS). I haven't heard of any other problems here which is why I'm less concerned.

However it would be very interesting to get official feedback from Adobe on the issue.

But as I said in a separate mail. I'm perfectly happy to remove this feature from this version of the spec.

/ Jonas

Reply via email to