[whatwg] Location object identity and navigation behavior

Boris Zbarsky bzbarsky at MIT.EDU
Tue Nov 20 08:23:44 PST 2012


On 11/20/12 2:38 AM, Ian Hickson wrote:
> IMHO there's no point us trying to keep things locked down when you set
> document.domain.

I believe sites actually rely on a certain amount of lockdown in 
situations like this...  Adam can fill you in, I'm sure.

But in general, as people work more and more on Widgety and Appy stuff 
in HTML, with various expanded privileges, granted permissions, etc, the 
assumption that the security model is completely symmetric just becomes 
false.  I'd rather we didn't paint ourselves into a corner by assuming 
otherwise here and requiring behavior that UAs would simply refuse to 
implement because they view it as insecure.

>>> if you have both calling each other then you can almost certainly
>>> trick the script into doing what you want either way.
>>
>> Who said anything about both calling each other?
>
> If they're not calling each other, how are they both on the stack?

This only requires one of them calling the other.  It doesn't require 
"the other" being able to call back into "one".

Maybe that's not what you meant, though.  So let me give you a concrete 
not-exactly-hypothetical example.

Say I'm implementing a debugger in a web browser, and I implement my UI 
in HTML+JS as browsers are tending to do now.  When I examine properties 
with scripted getters in this debugger, what should happen?  I will bet 
money that the debugger is not, generally, running with the permissions 
of the page, because it needs to be able to do things that web pages 
aren't allowed to do.  However the getters in question had better run 
with the permissions of the page; otherwise you open up the debugger to 
attacks from the web page.  This problem is not solvable using the 
"separate worlds" approaches browsers use to provide extensions with an 
unmodified view of the DOM, since the debugger really does want to see 
what's going on in the web page itself; it just doesn't want to allow 
the page to escalate permissions.

Now I know there are several possible objections to this use case, so 
let me just pre-address some:

1)  "It's not the web, so we don't have to specify it."  That's true, 
sure.  I suspect as time goes on we might in fact need to specify 
something like this for apps, however.  And more importantly, just 
because it's not the web doesn't mean UAs are not implementing it, and 
if they're implementing it they need to make it work with their security 
model, whatever it is.

2)  "The debugger can have some magic to make it all work."  Yes, but 
then the question is how it interacts with the web security model and 
how the result can be implemented.

3)  "The debugger should set the entry script before invoking the 
getter."  This is a plausible approach, but it makes it very error-prone 
and complicated to create things like the above-described debugger: you 
have to manually keep track of which objects come from where instead of 
just having the web platform implementation (which already has that 
information) keep track of it for you.

4)  "Entry script should always be set when crossing origins" (for some 
definition of "crossing origins").  This seems plausible as well.  Maybe 
it's doable.

One other note: Gecko's current model is at least somewhat influenced by 
the fact that in the past Gecko had expanded privileges on a 
per-function basis.  This obviously made using the entry script a 
non-starter...  Maybe it's more of a starter now.  I'll let Bobby worry 
about it.  ;)

-Boris




More information about the whatwg mailing list