<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://www.w3.org/Bugs/Public/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://www.w3.org/Bugs/Public/"
          
          maintainer="sysbot+bugzilla@w3.org"
>

    <bug>
          <bug_id>12272</bug_id>
          
          <creation_ts>2011-03-09 17:40:41 +0000</creation_ts>
          <short_desc>Improve section on DNS spoofing attacks to address user attacks</short_desc>
          <delta_ts>2011-06-01 18:21:07 +0000</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebAppsWG</product>
          <component>Web Storage (editor: Ian Hickson)</component>
          <version>unspecified</version>
          <rep_platform>All</rep_platform>
          <op_sys>All</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Mark Watson">watsonm</reporter>
          <assigned_to name="Ian &apos;Hixie&apos; Hickson">ian</assigned_to>
          <cc>art.barstow</cc>
    
    <cc>ayg</cc>
    
    <cc>ian</cc>
    
    <cc>mike</cc>
    
    <cc>public-webapps</cc>
          
          <qa_contact>public-webapps-bugzilla</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>46577</commentid>
    <comment_count>0</comment_count>
    <who name="Mark Watson">watsonm</who>
    <bug_when>2011-03-09 17:40:41 +0000</bug_when>
    <thetext>Section 7.1 on DNS spoofing attacks states: &quot;Pages using TLS can be sure that only pages using TLS that have certificates identifying them as being from the same domain can access their storage areas.&quot;

We could add &quot;This protects against DNS spoofing attacks which do not involve the user. However, if the user is involved in the attack this protection can be circumvented by the user installing root certificates for fake certification authorities and then creating site certificates to be used in conjunction with DNS spoofing. Therefore a web page author cannot be sure that the information stored in web storage has not been viewed or modified by or on behalf of the user.&quot;

i.e. page authors should be aware that even with TLS information inside web storage can be viewed and modified by or on behalf of the user.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>46585</commentid>
    <comment_count>1</comment_count>
    <who name="Aryeh Gregor">ayg</who>
    <bug_when>2011-03-09 20:41:34 +0000</bug_when>
    <thetext>How is this different from the user just manually editing the storage areas on disk, or a malicious program installed on their computer doing that?  The client is always untrusted.  The only guarantees we can even try to provide are against network attacks, e.g., an attacker who gets the user to visit a malicious webpage.  That should be safe as long as the client isn&apos;t compromised.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>46588</commentid>
    <comment_count>2</comment_count>
    <who name="Mark Watson">watsonm</who>
    <bug_when>2011-03-09 20:54:47 +0000</bug_when>
    <thetext>(In reply to comment #1)
&gt; How is this different from the user just manually editing the storage areas on
&gt; disk, or a malicious program installed on their computer doing that?  The
&gt; client is always untrusted.  The only guarantees we can even try to provide are
&gt; against network attacks, e.g., an attacker who gets the user to visit a
&gt; malicious webpage.  That should be safe as long as the client isn&apos;t
&gt; compromised.

You&apos;re right, but the existing text suggested to me that using TLS provided some assurance *for the web page* that the information was safe from attack. In fact it provides this assurance only in respect of certain kinds of attack. Perhaps that is implicit and doesn&apos;t need to be called out ?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>46626</commentid>
    <comment_count>3</comment_count>
    <who name="Aryeh Gregor">ayg</who>
    <bug_when>2011-03-11 02:15:50 +0000</bug_when>
    <thetext>Yes, maybe it would be worth explicitly calling out (if it hasn&apos;t been already) that anyone with access to the user&apos;s computer has full access to website storage.  Some people seem to get confused about that and think that some type of magical encryption should be used that only lets the site itself access it, somehow.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>49024</commentid>
    <comment_count>4</comment_count>
    <who name="Ian &apos;Hixie&apos; Hickson">ian</who>
    <bug_when>2011-06-01 17:42:19 +0000</bug_when>
    <thetext>I&apos;ve tweaked the text.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>49025</commentid>
    <comment_count>5</comment_count>
    <who name="">contributor</who>
    <bug_when>2011-06-01 17:43:43 +0000</bug_when>
    <thetext>Checked in as WHATWG revision r6169.
Check-in comment: Don&apos;t overpromise in security sections...
http://html5.org/tools/web-apps-tracker?from=6168&amp;to=6169</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>