I've started on editing the sniffing document in earnest. 

Foolishly, I started going through it from the beginning.  Here's a take at the 
Abstract to make the scope clearer:

      <t>HTTP provides a way of labeling content with its
      Content-Type, an indication of the file format / language by
      which the content is to be interpreted.  Unfortunately, many web
      servers, as deployed, supply incorrect Content-Type header
      fields with their HTTP responses.  In order to be compatible
      with these servers, web clients would consider the content of
      HTTP responses as well as the Content-Type header fields when
      determining how the content was interpreted (the "effective
      media type").  Looking at content to determine its type (aka
      "sniffing") is also used when no Content-Type header is
      supplied.  Overly ambitious sniffing has resulted in a number of
      security issues in the past.  This document specifies methods
      and options for computing an effective media type, in a way that
      addresses both security and compatibility considerations.
      It also discusses the use of sniffing in contexts other than
      delivery of content via HTTP.
      </t>

I wanted to address the scope by making it clear that the scope of the document 
included sniffing outside of content delivered via HTTP.

*** Shouldn't sniffed content have a different origin than the content as 
labeled?  The only "privilege upgrade" that I've come across seem to be 
cross-origin ones. 

*** Is sniffing used by servers when clients use file-upload? Doe web servers 
do sniffing on content to decide what media type to label the content with? Or 
is sniffing really only scoped  to apply to web browsers?

    <section anchor="intro" title="Introduction">

      <t>HTTP provides a way of labeling content with its
      Content-Type, as an indication of the file format / language by
      which the content is to be interpreted.  Unfortunately, many web
      servers, as deployed, supply incorrect Content-Type header
      fields with their HTTP responses.  In order to be compatible
      with these servers, web clients would consider the content of
      HTTP responses as well as the Content-Type header fields when
      determining how the content was interpreted (the "effective
      media type").  Looking at content to determine its type (aka
      "sniffing") is also used when no Content-Type header is
      supplied.</t>

I tried to introduce "effective media type" as it was used before defined.

Where is the term "privilege escalation", as used in this document, defined?

http://en.wikipedia.org/wiki/Privilege_escalation

defines the term in general, and then at the end mentions a couple of examples 
under

===============begin Wikipedia quote ===========================
"Examples of horizontal privilege escalation"

This problem often occurs in web applications. Consider the following example:
User A has access to his/her bank account in an Internet Banking application.
User B has access to his/her bank account in the same Internet Banking 
application.
The vulnerability occurs when User A is able to access User B's bank account by 
performing some sort of malicious activity.
This malicious activity may be possible due to common web application 
weaknesses or vulnerabilities.
Potential web application vulnerabilities or situations that may lead to this 
condition include:
* Predictable session ID's in the user's HTTP cookie
* Session fixation
* Cross-site Scripting
* Easily guessable passwords
* Theft or hijacking of session cookies
* Keystroke logging
===============end Wikipedia quote ==========================

But there are no mentions there of sniffing is a source of privilege escalation.

 Surely since this is the main use case the specification is intended to 
mitigate, shouldn't it be described somewhere? 

The examples given in passing in the document seem to be XSS attacks (which 
would be mitigated merely by giving sniffed content a different unique origin, 
wouldn't it?) 

The  abstract implies there might be other attacks too...  are there? what are 
they?

Larry
--
http://larry.masinter.net


_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to