Re: Accountability in AC4CSR

Hi Tyler,
Thanks for presenting the cookie situation in this manner. One way to
address your concern is to not send cookies. As I have stated numerous
times, I don't think Access Control takes the best approach towards
addressing the cross-site problem, but nevertheless, if it goes forward in
a manner similar to what is in the spec today, I would prefer that it not
send cookies. Or at a minimum, only transmit cookies if there is a prior
OPTIONS call where the cross-site server authorizes the browser to send
site B's cookies.

Jon



                                                                           
             "Close, Tyler J."                                             
             <tyler.close@hp.c                                             
             om>                                                        To 
             Sent by:                  Web Application Formats Working     
             public-appformats         Group WG <public-appformats@w3.org> 
             -request@w3.org                                            cc 
                                                                           
                                                                   Subject 
             02/06/2008 02:05          Accountability in AC4CSR            
             PM                                                            
                                                                           
                                                                           
                                                                           
                                                                           
                                                                           





One of the primary purposes of access control is correctly assigning
accountability for actions. I think the current AC4CSR proposal creates
subtle and perhaps unexpected consequences for an application's ability to
correctly assign accountability.

On the Web, it is common for an application to be designed such that the
user whose authentication cookie was used in an operation is held
accountable for that operation. For example, I am accountable for deleting
email from my web-based email account. The basis for assigning this
accountability is that my password is private to me, so the operation must
have been submitted by me, or an agent I have given my password to.

Since the current AC4CSR proposal requires that the user's cookies be sent
in a cross-domain request, this basis for assigning accountability no
longer holds. A web page from Site A which issues a cross-domain request to
Site B could do so without the knowledge of the user, so the user cannot
reasonably be held accountable for the effects of the request. Since the
cross-domain request is labeled by the browser with the Referer-Root of
Site A, it is tempting to say Site A should be held accountable.
Unfortunately, this is not secure since Site B cannot know for sure that
this labeling was done by an honest browser. Using another tool, the user
could send a request to Site B labeled with a Referer-Root for Site A, in
effect attempting to blame Site A for the request to Site B. So Site B is
left in the position of not being able to hold either the user or Site A
accountable for the request.

What mechanism is the WG recommending for assigning accountability for a
cross-domain request? It seems some mechanism must be recommended, since
the WG has eliminated the status quo approach.

--Tyler

Received on Wednesday, 6 February 2008 22:23:56 UTC