On Sat, Aug 17, 2013 at 6:45 PM, Tobias Gondrom
<[email protected]>wrote:

> Dear Richard,
>
> thanks for the review and your discusses and comments.
> Answers inline.
> I followed all your suggestions in version-10, except for D2.
> Thanks for the review and all the best,
>
> Tobias
>
>
>
> On 15/08/13 02:41, Richard Barnes wrote:
> > Richard Barnes has entered the following ballot position for
> > draft-ietf-websec-x-frame-options-09: Discuss
> >
> > When responding, please keep the subject line intact and reply to all
> > email addresses included in the To and CC lines. (Feel free to cut this
> > introductory paragraph, however.)
> >
> >
> > Please refer to http://www.ietf.org/iesg/statement/discuss-criteria.html
> > for more information about IESG DISCUSS and COMMENT positions.
> >
> >
> > The document, along with other ballot positions, can be found here:
> > http://datatracker.ietf.org/doc/draft-ietf-websec-x-frame-options/
> >
> >
> >
> > ----------------------------------------------------------------------
> > DISCUSS:
> > ----------------------------------------------------------------------
> >
> > (D1) The privacy considerations make no sense to me.  To whom is data
> > being leaked?  To the browser?  To random people who send a request to a
> > URI?  Do you mean that X-Frame-Options leaks information about who the
> > site authorizes?  That's true, but also true of things like CORS.  If
> > this is the concern, you should recommend a mitigation that's basically
> > the same as what CORS does, namely varying the value of X-Frame-Options
> > based on the Referer or Origin header.
> Yes.
> Ok. I expanded the text and explanation of the privacy considerations
> section accordingly.
>
> >
> > (D2) It seems like this is a value that browsers might cache, to avoid
> > unnecessary requests if the same page is framed in the future.  If this
> > is something browsers do today, please say so.
>
> Actually I like to push back in this case, as I don't think we should go
> into implementation specific details that have no effect on the bits on
> the wire nor on the effective behavior of the browser.
> The X-Frame-Options header determines the behaviour for every individual
> requested page regarding framing in another web page in the browser.
> Whether the browser caches this information and compares the request
> with an existing cache from a request from before AND if the value is
> identical proceeds as before or whether the browser evaluates the
> X-Frame-Options header on each request should not be specified in this
> draft.
>
>

I get this.  I'm actually just asking for some clarification about what
browsers do -- whether they do or don't cache X-Frame-Options settings.  It
seems like something that could cause problems for web site operators, so
it would be helpful to know.  Not looking for any normative text here.



> >
> > (D3) Shouldn't ALLOW-FROM be followed by an origin, not a URI?  In other
> > words, what does it mean to send "X-Frame-Options: ALLOW-FROM
> > https://example.com/this/is/a/path?query#fragment";?
>
> Yes. You are right we can refine the definition to "serialized-origin"
> (as a subset of URI).
> Please note that according to RFC6454 we need to use "serialized-origin"
> here and not origin (as origin in RFC6454 refers also to a list of
> origins, which would not be acceptable here).
> I adjusted the text accordingly.
>
> Note: From an editorial standpoint we can debate whether to use lower
> case "serialized-origin" or capital "SERIALIZED-ORIGIN". RFC6454 uses
> lower case. So I used that one, but I am open for either.



It seems like the ABNF in this document should just import the ABNF from RF
6454.  So, "serialized-origin".



>
> >
> > (D3) In the ALLOW-FROM: what does "top level context" mean?  Do you
> > really mean the top level here, as opposed to the next one up?
> Yes. And unfortunately with the problems you outlined in the next
> sentence (which are also described in the security considerations
> sections of the draft.)
> Ted raised a related comment. So I guess the current text regarding
> nesting and potential problem is not sufficiently clear. So I will add
> further explanations. And I will add a reference to the security
> considerations section which already contains a paragraph about this
> problem. (i.e. the 2nd paragraph).
>
>
> > For
> > example, suppose A loads B in an iframe, and B loads C, and then C sends
> > an X-Frame-Options header with ALLOW-FROM.  Is the ALLOW-FROM origin
> > compared to B or A?  In either case, you should also note the attacks
> > that remain.  For example, if the answer is B, then B needs to use
> > X-Frame-Options as well, or else, A can maliciously frame A within B.  Or
> > if the answer is A, then C is trusting A not to load any malicious
> > intermediate frames B.
> I added text accordingly to section 5.
> (and I initiated a research query to re-confirm again that we still have
> the two inconsistent browser behaviour cases here (framing page vs.
> top-level frame, as I wrote in the draft).


Great, that should be fine.  I've gone ahead and cleared this point.




> >
> >
> > ----------------------------------------------------------------------
> > COMMENT:
> > ----------------------------------------------------------------------
> >
> > (C1) In the Introduction, the phrase "secure web page" would seem to
> > imply that this mechanism only applies to pages delivered over HTTPS,
> > which I'm pretty sure isn't true.  Suggest just deleting "secure".
> Ok. removed.
>
> >
> > (C2) In Section 2.1, the sentence starting "And the algorithm" seems to
> > imply that ALLOW-FROM allows SAMEORIGIN requests as well, which I think
> > you actually mean something like:
> > """
> > And the algorithm to compare origins from [RFC6454] SHOULD be used to
> > verify that a referring page is of the same origin as the content (in the
> > case of SAMEORIGIN) or that the referring page's origin is identical with
> > the ALLOW-FROM URI (in the case of ALLOW-FROM).
> > """
> Thank you. I changed the text to your suggestion.
>
> >
> > _______________________________________________
> > websec mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/websec
>
>
_______________________________________________
websec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/websec

Reply via email to