- From: John Panzer <jpanzer@acm.org>
- Date: Wed, 13 Feb 2008 09:54:42 -0800
- To: Ian Hickson <ian@hixie.ch>
- CC: "WAF WG (public)" <public-appformats@w3.org>
- Message-ID: <47B32EE2.9000400@acm.org>
Ian Hickson wrote: > On Tue, 12 Feb 2008, John Panzer wrote: > >>> (Though they might need to use different headers, of course -- we >>> obviously can't allow scripts doing cross-origin requests to >>> arbitrarily change HTTP authenticiation headers.) >>> >> Sorry, it's not obvious to me. We're talking about a situation where >> the server has explicitly opted in to CSRs. I can understand not >> sending authorization data from the browser itself by default, maybe, >> but to block scripts from setting a header seems unnecessary and will >> just lead to X-Authorization:. >> > > There's no way we can allow a distributed authorisation credentials attack > on systems using username/password authentication or cookie authentication > mechanisms. The browser vendors just wouldn't let implement anything that > allowed that. > What mechanism do you propose clients and servers implement use to authenticate users for CSR requests? Because servers have to implement _something_. Realistic mechanisms have to be resistant to distributed brute force attacks even without AC4CSR (thank you, Storm Worm). On a side note, I hope that servers opting in to CSR would never consider using username/password auth on each request. Since it is possible to implement username/password auth in ways opaque to browsers ("&u=foo&pass=bar"), perhaps this is worth a note in the security section. John
Received on Wednesday, 13 February 2008 17:51:13 UTC