W3C home > Mailing lists > Public > public-webapps@w3.org > October to December 2009

Re: Use Cases and Requirements for Saving Files Securely

From: Jonas Sicking <jonas@sicking.cc>
Date: Thu, 12 Nov 2009 02:45:23 -0800
Message-ID: <63df84f0911120245y4be32953n7eb04f02b9b701af@mail.gmail.com>
To: ifette@google.com
Cc: Maciej Stachowiak <mjs@apple.com>, Eric Uhrhane <ericu@google.com>, Ian Hickson <ian@hixie.ch>, Doug Schepers <schepers@w3.org>, "public-webapps@w3.org" <public-webapps@w3.org>, public-device-apis@w3.org
2009/11/12 Ian Fette (イアンフェッティ) <ifette@google.com>:
> 2009/11/12 Jonas Sicking <jonas@sicking.cc>
>>
>> 2009/11/12 Ian Fette (イアンフェッティ) <ifette@google.com>:
>> > This is really getting into fantasy-land... Writing a file and hoping
>> > that
>> > the user actually opens up explorer/finder/whatever and browses to some
>> > folder deep within the profile directory, and then double clicks
>> > something?
>> > Telling a user "click here and run blah to get a pony" is so much
>> > easier.
>>
>> So first off that only addresses one of the two attacks I listed.
>>
>
> Fair
>
>>
>> But even that case I don't think is that fantasy-y. The whole point of
>> writing actual files is so that users can interact with the files,
>> right? In doing so they'll be just a double-click away from running
>> arbitrary malicious code. No warning dialogs or anything. Instead the
>
> Why do you assume this? On Windows, we can write the MotW identifier, which
> would lead to windows showing a warning. On linux, we could refuse to chmod
> +x.

Ah, don't know enough about this feature so can't really comment. All
the information I found was regarding MotW on webpages, not on
executables.

/ Jonas
Received on Thursday, 12 November 2009 10:46:16 GMT

This archive was generated by hypermail 2.3.1 : Tuesday, 26 March 2013 18:49:35 GMT