On 7/22/10 5:32 PM, Luke Hutchison wrote:
Well, is it the simplest one, though?  If closing it will do nothing for
security but just inconvenience people, what's the point?  I'd really rather
not have us doing security theater just to look like we're doing something.

It's not unreasonable to guess that the number of people
inconvenienced by the easy exploitability of the current behavior
numbers in the millions, given that Facebook has 500M users and these
viruses continue to spread like wildfire.  The number inconvenienced
by having these URLs disabled by default (and re-enableable via a
developer option the first time they hit this limitation) would be
several orders of magnitude smaller than that number.

Given the success of these exploits so far, it is also reasonable to
suggest that the sophistication of attack will only increase with
time.

I'll note that you didn't actually answer my question, which was whether changing the behavior here would actually have tangible security benefits. I can see the security benefits of disallowing all cross-origin application of javascript: (if you don't know where it came from, don't apply it). But it doesn't sound like you're suggesting that... and what you're suggesting seems to only close one of at least two equally easy to target social-engineering attacks. In other words, its usefulness as a security measure relies on its not being implemented yet; the moment it's implemented the virus writers will switch to the other attack, no?

Now if we really think the other attack is harder to carry out, that's a different kettle of fish, as I said. But I see no evidence of that....

-Boris

Reply via email to