> -----Original Message----- > From: Boris Zbarsky [mailto:[email protected]] > Sent: Monday, October 15, 2012 9:50 PM > > On 10/15/12 7:18 AM, Jungkee Song wrote: > > but if certain backend intends to provide its content under some browser > requirements, isn't "Vary: User-Agent" sort of a required header to have > related caching proxy, if any, work correctly? > > Yes, it is, but it's rare for websites to think about that sort of thing > in my experience. > > In particular, I have yet to encounter a site that both does server-side > UA sniffing _and_ sends Vary: User-Agent.
Yes, I think it's very rare. I found that a Korean web portal site, "Naver", does send "Vary:Accept-Encoding,User-Agent" upon the request to "http://www.naver.com" and "http://m.naver.com", though. > > Otherwise, subsequent requests on the same resource with different User- > Agent string would be regarded as a cache HIT in caching proxy anyway. > > Indeed. > > > Anyway, the point here is that if changing of User-Agent is allowed in > script, it will be possible for malicious third party to set arbitrary > User-Agent strings in generating XSS attacks. > > While true, a third party can already do this with things like botnets, > no? I'm not sure I see the additional threats here. Can you explain? >From that perspective, I don't think setting the User-Agent string in script >poses any unknown treats. However, it seems like we are permitting another >choice which is simply calling a JavaScript function. FYI, here is another article [1] written about the compatibility problem on changing the UA string at runtime. [1] http://blogs.msdn.com/b/ieinternals/archive/2009/10/08/extending-the-user-agent-string-problems-and-alternatives.aspx Jungkee
