[http-state] wrt Browser Security Handbook wrt cookies (was: Documenting the test results)
=JeffH <Jeff.Hodges@KingsMountain.com> Mon, 17 August 2009 22:51 UTC
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: http-state@core3.amsl.com
Delivered-To: http-state@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 1E8F53A6CE7 for <http-state@core3.amsl.com>; Mon, 17 Aug 2009 15:51:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.265
X-Spam-Level:
X-Spam-Status: No, score=-2.265 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KfSJa7F+-mfZ for <http-state@core3.amsl.com>; Mon, 17 Aug 2009 15:51:19 -0700 (PDT)
Received: from outbound-mail-152.bluehost.com (outbound-mail-152.bluehost.com [67.222.39.32]) by core3.amsl.com (Postfix) with SMTP id 4DE153A6C42 for <http-state@ietf.org>; Mon, 17 Aug 2009 15:51:19 -0700 (PDT)
Received: (qmail 2001 invoked by uid 0); 17 Aug 2009 22:51:12 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by outboundproxy5.bluehost.com with SMTP; 17 Aug 2009 22:51:12 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=AGiokmVARq2eo0Q7SbZCy07gAVBHqcg2wS4Hrb6nmVYlrT0LwYphhIN8MQ4wo9AjKn1c16Y9OOQxf+n03CuJqLxg88mclRrwzZUA1W019SkMsJcFI4UIPU7TS7wlFZeT;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.48.61]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1MdB2l-0003Pj-OF for http-state@ietf.org; Mon, 17 Aug 2009 16:51:12 -0600
Message-ID: <4A89DEEC.8090900@KingsMountain.com>
Date: Mon, 17 Aug 2009 15:51:24 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Thunderbird 1.5.0.14ubu (X11/20080306)
MIME-Version: 1.0
To: HTTP State <http-state@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: [http-state] wrt Browser Security Handbook wrt cookies (was: Documenting the test results)
X-BeenThere: http-state@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discuss HTTP State Management Mechanism <http-state.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/http-state>
List-Post: <mailto:http-state@ietf.org>
List-Help: <mailto:http-state-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/http-state>, <mailto:http-state-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Aug 2009 22:51:20 -0000
Yes, the Browser Security Handbook has some very interesting data wrt cookies and behavior thereof for a number of UAs. Specifically, the "same-origin policy for cookies" section.. http://code.google.com/p/browsersec/wiki/Part2#Same-origin_policy_for_cookies ..(note the table at the end of the section). Also, Michal (the author) has a bunch of test cases that can be downloaded here.. http://browsersec.googlecode.com/files/browser_tests-1.03.tar.gz ..I don't know if they're any help for the test harness effort you all are engaging in. HTH, =JeffH