Re: Security of cross-origin pushed resources

imho, cross-origin push should only be allowed when the cert has
authenticated the endpoint as being authoritative for the other entity.
-=R



On Fri, Sep 20, 2013 at 1:08 PM, Patrick McManus <pmcmanus@mozilla.com>wrote:

> I think Jo has a reasonable point. Cross origin pushes that can have their
> domain be backed up by a verifiable cert are pretty awesome, but lacking
> that we shouldn't allow them in an unverified context.
>
> no matter what we do in specification land, people are going to put L4
> load balancers in front of two nodes that aren't really related to each
> other (an issue the cert can sort out) and this becomes a pretty easy
> exploit. We would essentially be changing the definition of origin from
> hostname to be resolved-ip and I don't think that's in our purview to do.
>
>
> On Fri, Sep 20, 2013 at 3:26 PM, William Chan (陈智昌) <willchan@chromium.org
> > wrote:
>
>> I think this is a good question that I don't know is well specified
>> anywhere. I recall us discussing for HTTP/1.1 whether or not it's feasible
>> for a client to reuse a TCP connection for the same destination IP address,
>> even if it's for different origins. My understanding is mnot ran a quick
>> test of the feasibility and showed that it works 99.X% of the time or
>> something, but my memory's vague on the matter. Mark can correct me here.
>>
>>
> I've done the research on this in the past - but the details are fuzzy.
> There was a prominent LB that had a switch through mode that was a
> recommended performance best practice.. basically after finding the first
> request (cookies and host header primarily) it determined what back end to
> use and from there just went into a TCP tunnel thereafter. So there were
> definite security issues and interop argument along the lines of "it works
> for N nines" probably isn't enough.
>

Received on Friday, 20 September 2013 22:56:43 UTC