[html5] r5045 - [e] (0) remove obsolete warning
whatwg at whatwg.org
whatwg at whatwg.org
Wed Apr 14 02:13:48 PDT 2010
Author: ianh
Date: 2010-04-14 02:13:47 -0700 (Wed, 14 Apr 2010)
New Revision: 5045
Modified:
complete.html
source
Log:
[e] (0) remove obsolete warning
Modified: complete.html
===================================================================
--- complete.html 2010-04-14 09:12:16 UTC (rev 5044)
+++ complete.html 2010-04-14 09:13:47 UTC (rev 5045)
@@ -70764,22 +70764,6 @@
purposes. Their semantics are equivalent to the semantics of the
HTTP headers with the same names.</p>
- <p class=warning>If a server reads fields for authentication
- purposes (such as <code title="">Cookie</code>), or if a server
- assumes that its clients are authorized on the basis that they can
- connect (e.g. because they are on an intranet firewalled from the
- public Internet), then the server should also verify that the
- client's handshake includes the invariant "Upgrade" and
- "Connection" parts of the handshake, and should send the server's
- handshake before changing any user data. Otherwise, an attacker
- could trick a client into sending WebSocket frames to a server
- (e.g. using <code>XMLHttpRequest</code>) and cause the server to
- perform actions on behalf of the user without the user's
- consent. (Sending the server's handshake ensures that the frames
- were not sent as part of a cross-protocol attack, since other
- protocols do not send the necessary components in the client's
- initial handshake for forming the server's handshake.)</p>
-
</dd>
</dl><p>Unrecognized fields can be safely ignored, and are probably
Modified: source
===================================================================
--- source 2010-04-14 09:12:16 UTC (rev 5044)
+++ source 2010-04-14 09:13:47 UTC (rev 5045)
@@ -79412,22 +79412,6 @@
purposes. Their semantics are equivalent to the semantics of the
HTTP headers with the same names.</p>
- <p class="warning">If a server reads fields for authentication
- purposes (such as <code title="">Cookie</code>), or if a server
- assumes that its clients are authorized on the basis that they can
- connect (e.g. because they are on an intranet firewalled from the
- public Internet), then the server should also verify that the
- client's handshake includes the invariant "Upgrade" and
- "Connection" parts of the handshake, and should send the server's
- handshake before changing any user data. Otherwise, an attacker
- could trick a client into sending WebSocket frames to a server
- (e.g. using <code>XMLHttpRequest</code>) and cause the server to
- perform actions on behalf of the user without the user's
- consent. (Sending the server's handshake ensures that the frames
- were not sent as part of a cross-protocol attack, since other
- protocols do not send the necessary components in the client's
- initial handshake for forming the server's handshake.)</p>
-
</dd>
</dl>
More information about the Commit-Watchers
mailing list