Anne van Kesteren wrote:

On Mon, 23 Jul 2007 10:35:27 +0200, Jonas Sicking <[EMAIL PROTECTED]> wrote:
A couple of questions regarding the cross-site XHR proposal:
http://lists.w3.org/Archives/Public/public-webapi/2006Jun/0012

As detailed in http://wiki.mozilla.org/Cross_Site_XMLHttpRequest cross-site requests should alway have the headers set through setRequestHeader removed. This includes requests done after a redirect to a different server.

Why prevent a user from setting the "Content-Access-Control" header? That is generally a response header and I'd expect servers to ignore it.

If requests with arbitrary headers set can harm a server they are already vulnerable. Is it really wise to restrict this?

I'm arguing for allowing the header to be set, as no server has any reason to pay attention to it.

What is the purpose of the Referer-Root header? Why can't sites rely on the Referer header?

Isn't Referer disabled by some third-party software now and then? Such as antivirus software? Another reason is probably that Referer-Root contains the exact format needed for the access check. We could use that in the access-control document probably.

This seems like a loosing battle that I don't see a reason to fight. If the user (by installing software or through corporate policies) disables the Referer header, why should we try to circumvent them? That seems just likely to piss them off and then add Referer-Root to their blocking list.

If the sites want to use the Referer header and it has been blocked the site can simply deny the request. Non-idea for the end-user, but by their own choice.

/ Jonas

Reply via email to