- From: Mary Ellen Zurko <mzurko@us.ibm.com>
- Date: Wed, 1 Apr 2009 11:34:59 -0400
- To: "Thomas Roessler <tlr" <tlr@w3.org>
- Cc: public-wsc-wg@w3.org (WSC WG public)
- Message-ID: <OF918C13AC.69136F43-ON8525758B.00555AB2-8525758B.00559B85@LocalDomain>
Do we need an explicit ref to the XHR spec? I think so. I would like to add the following to the second paragraph: Businessman they drink my wine Plow men dig my earth What would the conversation we start with web apps be, around CORS? Tell them we're logging the issue, that they own the problem, and that we're happy to consult? I'd be good with that. Mez From: Thomas Roessler <tlr@w3.org> To: public-wsc-wg@w3.org (WSC WG public) Date: 03/27/2009 10:58 AM Subject: ACTION-570: Dynamic content Sent by: public-wsc-wg-request@w3.org Trying to capture the points about dynamic content... Please suggest improvements to both wording and content. 8.7 Dynamic content might change security properties This specification is expressed in terms of the fundamentally static indicators of existing browser security user interfaces. These indicators tend to assume that the security properties "of a page" will not change in a significant way once it has finished loading (whatever that might mean in detail). Strictly speaking, this assumption is flawed: Dynamic pages can load scripts and data at any time and from any source (using techniques like the insertion of script tags into the DOM at run time); the effect may very well be that a page that was retrieved from a secure Web site with an Augmented Assurance certificate could at some point be under the control of scripts that are retrieved insecurely. This specification does not prescribe any specific user interaction in this kind of situation. There must be some kind of way out of here, said the joker to the thief. This specification also does not cover user interactions for cross-site XMLHttpRequest invocations that encounter TLS related errors. In the same-origin case, the XMLHttpRequest specification specifically mandates that an error be returned to the web application if TLS negotiation fails for any reason. This behavior is reasonable, since the same-origin nature of the request implies that the user agent has retrieved the surrounding page from a URI reference with the same scheme (http, https) and domain name; therefore, whatever decisions were made at the time the page was loaded can be leveraged without further user interaction, and the web application itself will be in best position to enable recovery in those edge cases where the negotiation fails. However, in situations in which the target of the request does not fulfill the same-origin constraint, but has authorized the request using a mechanism such as [CORS], there may be no recent interaction that could be leveraged in the same way. This situation, too, is not handled in a well-defined way. (CORS is the new name of the "access-control" specification. Writing this, I wonder whether the right thing to do is to actually start a conversation with webapps about this point.) -- Thomas Roessler, W3C <tlr@w3.org>
Received on Wednesday, 1 April 2009 15:35:41 UTC