<hat="individual">
Hello dear websec fellows,
please note that following the consensus of the WG for adotion of the
drafts, David and I revised the draft-gondrom-frame-options-02 draft and
uploaded it as websec WG document: draft-ietf-websec-frame-options-00
http://www.ietf.org/id/draft-ietf-websec-frame-options-00.txt
And my apologies that this revision took so long, as I was a bit
occupied with other drafts.
Please take a read and am looking forward to your feedback.
To my knowledge there are a number of topics to be discussed about this
draft, two of them being:
1. we (the editors) removed the list of origins from the ALLOW-FROM
field, due to performance concerns with processing the origin-list. Now
it is only one URI. I am personally not entirely sure this to be the
right way, so would like to encourage discussion about this.
2. There has been some discussion whether FO (Frame-Options) should be
done in CSP instead.
In 2010/2011 there was an informal discussion about this with people
from WebAppSec with the recommendation to put in websec and it was
removed from the initial CSP version back then.
I still think that this was the right step and that FO is better done as
the successor of XFO in websec and the logical evolution step than
putting it in CSP.
My main thoughts here are:
- clear migration path from XFO to FO
- IMHO the FO function does not fit naturally with the other functions
and semantic of CSP if you look closely at CSP. And although I can sense
that it may look tempting to think about "saving http headers" and put
everything into one, I don't think this to be the right approach for FO
(nor in general).
However, I wanted to revive this discussion on the mailing-list whether
we should give up on FO and ask W3C WebAppSec to put it into CSP. One
thing I would really like to see in this discussion is to learn about
the perceived benefits from discontinuing our current approach on
Frame-Options in websec and trying to integrate it into CSP.
Btw. I will be out-of-office the next 5 days, so my apologies if I can
not answer to questions and arguments on FO immediately. I will be back
very shortly.
Best regards and looking forward to reviews and discussions.
Tobias
On 06/07/12 11:47, [email protected] wrote:
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Web Security Working Group of the IETF.
Title : HTTP Header Frame Options
Author(s) : David Ross
Tobias Gondrom
Filename : draft-ietf-websec-frame-options-00.txt
Pages : 9
Date : 2012-07-06
Abstract:
To improve the protection of web applications against Clickjacking
this standards defines a http response header that declares a policy
communicated from a host to the client browser whether the
transmitted content MUST NOT be displayed in frames of other pages
from different origins which are allowed to frame the content.
The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-websec-frame-options
There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-websec-frame-options-00
Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec