On 19 Apr 2009, at 16:24, Robin Berjon wrote:
On Apr 16, 2009, at 17:23 , Thomas Roessler wrote:
1. How is the information in this access element going to be used
at installation time or distribution time? I'd like to see some
spec text that explains this.
My understanding is that this is like the feature element and
others: it is metadata and its enforcement depends on a security
policy. When that security policy intervenes (I would expect at
runtime, for every access) is presumably orthogonal.
The security policy is likely to intervene at two different times:
1. Install time, when it might turn into a request to the user to
grant the requisite privileges.
2. Run time, when it will at the very least be enforced. (Or might
cause user interactions...)
2. If one of the risks we're interested in is firewall traversal,
then then proposed domain name wildcard has a somewhat different
risk profile than just a single domain name: while you can do a
DNS rebinding attack for a single hostname, that's a well-known
issue, and hopefully worked around in today's browser engines.
With the wildcard, though, it becomes relatively easy to do
firewall traversal: For example, one could simply generate DNS
records n.n.n.n.example.com that point to the IP address n.n.n.n.
I think that this is also meant to be orthogonal to firewalls, but
maybe I'm missing something?
Of course it's orthogonal to firewalls. However, it's not orthogonal
to looking at the side effects that the design here might have on
deployments.
If a particular design for the <access/> element is likely to cause a
larger attack surface, then that's a consideration that needs to go
into the design of <access/>. I'm claiming that the implicit
subdomain model has that effect.