- From: Priestley, Mark, VF-Group <Mark.Priestley@vodafone.com>
- Date: Mon, 16 Mar 2009 21:48:43 +0100
- To: "Thomas Roessler" <tlr@w3.org>, "Frederick Hirsch" <Frederick.Hirsch@nokia.com>
- Cc: "ext Marcos Caceres" <marcosc@opera.com>, "WebApps WG" <public-webapps@w3.org>
Thanks Thomas (and also Marcin from an earlier email) for the explanation. I support Thomas' suggested changes. Mark >-----Original Message----- >From: Thomas Roessler [mailto:tlr@w3.org] >Sent: 16 March 2009 11:18 >To: Frederick Hirsch >Cc: Priestley, Mark, VF-Group; ext Marcos Caceres; WebApps WG >Subject: Re: [widgets] Comments on Widget Signature update >(was RE: Widget Signature update) > >On 13 Mar 2009, at 15:50, Frederick Hirsch wrote: > >> Thanks for your review, I have some comments inline. Thomas, can you >> please review my proposed change to the security considerations text >> Mark mentioned? > > >I believe that you mean this piece of text: > >>> "Implementations that store the content of widget archives to the >>> file system during signature verification MUST NOT trust any path >>> components of file names present in the archive, to avoid >overwriting >>> of arbitrary files during signature verification." >>> >> >> >>> {Comment] I don't understand this sentence - which may well be a >>> problem with my understanding rather than the sentence - please can >>> you enlighten me, thanks. >> >> I think this is better worded as: >> >> Implementations MUST NOT overwrite <widget files> during signature >> verification, as this could open the possibility of an >attack based on >> substituting content for files due to malformed ds:Reference >URIs in a >> signature that has been replaced. >> >> (Thomas, can you please verify that I got that right?) > >The basic attack that this piece of the text is about is >unpacking a zip archive into the file system, trusting path >components, and ending up overwriting arbitrary system files, >because the zip file contained '../../../../etc/passwd'. >(Yes, I'm painting with an extremely broad brush here.) > >Two points: > >1. This should go into the security considerations, and >probably shouldn't be phrased as normative text. > >2. I agree with Mark that it's probably too confusing; I fear >that your proposed replacement doesn't capture everything. > >I'd suggest this instead: > >> Implementations should be careful about trusting path >components found >> in the zip archive: Such path components might be interpreted by >> operating systems as pointing at security critical files outside the >> widget environment proper, and naive unpacking of widget >archives into >> the file system might lead to undesirable and security relevant >> effects, e.g., overwriting of startup or system files. > >What do you think? >
Received on Monday, 16 March 2009 20:49:50 UTC