Hi,

just joined the list and making a small note in reply to this thread : 

On Wednesday, June 27, 2012 7:19:13 PM UTC-7, Boris Zbarsky wrote:
> On 6/27/12 6:49 PM, Robert O'Callahan wrote:
>> <iframe sandbox>  and CSP can't actually dynamically change the origin of a
>> document, can they? If they can we'd better fix that before it's too late
>> :-).

> The proposal to do sandboxing via CSP and the fact that you can put your 
> CSP into a <meta> tag mean that you can in fact dynamically change the 
> origin of a document, from whatever origin it had to a null principal, 
> when said <meta> tag is parsed.  Devdatta is implementing that right now...

> I do think it's somewhat daft, but people really want to do sandboxing 
> via CSP....

the current thinking after discussion with Dev and Dan Veditz
is that sandboxing via CSP in a <meta> tag won't be allowed.

Ian Hickson has also stated the spec actually implies this, since it says that 
any changes to sandboxing
only take effect on the next navigation, making sandboxing in <meta> CSP a nop.

There's also some concerns about CSP via <meta> in general since an injections 
means
an attacker can affect the behavior of a page in unexpected ways if they can 
inject
a new CSP (modulo the restrictions imposed by the intersection logic)

Also, in general, i'm pretty curious about Servo's process model and its 
security architecture,
maybe that's best discussed in a new thread though (I really need to take some 
time
to understand Rust better as well). My particular interest is in how Servo 
relates to the process sandboxing project I'm working on and
any ideas around what Servo's possible addon model might be - 
Servo is often proposed as a solution to the needs driving the sandboxing 
project but it seems
there will still be unsafe, possibly exploitable code in certain parts of it. 

thanks,
ian









_______________________________________________
dev-servo mailing list
dev-servo@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-servo

Reply via email to