- From: Boris Zbarsky <bzbarsky@MIT.EDU>
- Date: Thu, 22 Jul 2010 17:39:47 -0400
On 7/22/10 5:32 PM, Luke Hutchison wrote: >> Well, is it the simplest one, though? If closing it will do nothing for >> security but just inconvenience people, what's the point? I'd really rather >> not have us doing security theater just to look like we're doing something. > > It's not unreasonable to guess that the number of people > inconvenienced by the easy exploitability of the current behavior > numbers in the millions, given that Facebook has 500M users and these > viruses continue to spread like wildfire. The number inconvenienced > by having these URLs disabled by default (and re-enableable via a > developer option the first time they hit this limitation) would be > several orders of magnitude smaller than that number. > > Given the success of these exploits so far, it is also reasonable to > suggest that the sophistication of attack will only increase with > time. I'll note that you didn't actually answer my question, which was whether changing the behavior here would actually have tangible security benefits. I can see the security benefits of disallowing all cross-origin application of javascript: (if you don't know where it came from, don't apply it). But it doesn't sound like you're suggesting that... and what you're suggesting seems to only close one of at least two equally easy to target social-engineering attacks. In other words, its usefulness as a security measure relies on its not being implemented yet; the moment it's implemented the virus writers will switch to the other attack, no? Now if we really think the other attack is harder to carry out, that's a different kettle of fish, as I said. But I see no evidence of that.... -Boris
Received on Thursday, 22 July 2010 14:39:47 UTC