Re: [websec] Same Origins and email

"Murray S. Kucherawy" <msk@cloudmark.com> Mon, 12 December 2011 19:42 UTC

Return-Path: <msk@cloudmark.com>
X-Original-To: websec@ietfa.amsl.com
Delivered-To: websec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F26921F84FB for <websec@ietfa.amsl.com>; Mon, 12 Dec 2011 11:42:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.581
X-Spam-Level:
X-Spam-Status: No, score=-102.581 tagged_above=-999 required=5 tests=[AWL=0.018, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CWL3JyMA7T9i for <websec@ietfa.amsl.com>; Mon, 12 Dec 2011 11:42:42 -0800 (PST)
Received: from ht1-outbound.cloudmark.com (ht1-outbound.cloudmark.com [72.5.239.25]) by ietfa.amsl.com (Postfix) with ESMTP id 1930C21F8AFC for <websec@ietf.org>; Mon, 12 Dec 2011 11:42:42 -0800 (PST)
Received: from malice.corp.cloudmark.com (172.22.10.71) by EXCH-HTCAS901.corp.cloudmark.com (172.22.10.73) with Microsoft SMTP Server (TLS) id 14.1.355.2; Mon, 12 Dec 2011 11:42:41 -0800
Received: from EXCH-C2.corp.cloudmark.com ([172.22.1.74]) by malice.corp.cloudmark.com ([172.22.10.71]) with mapi; Mon, 12 Dec 2011 11:42:41 -0800
From: "Murray S. Kucherawy" <msk@cloudmark.com>
To: "websec@ietf.org" <websec@ietf.org>
Date: Mon, 12 Dec 2011 11:42:40 -0800
Thread-Topic: [websec] Same Origins and email
Thread-Index: Acy5A8mOrfidyAe0QtSJZDfIz5NWZQAAOLAg
Message-ID: <F5833273385BB34F99288B3648C4F06F19C6C1551F@EXCH-C2.corp.cloudmark.com>
References: <F5833273385BB34F99288B3648C4F06F19C6C15518@EXCH-C2.corp.cloudmark.com> <CAJE5ia8mDSjr6ww3uduUP_SQV2i9CB5cpuLDzL1tj8MvWb8PcA@mail.gmail.com> <F5833273385BB34F99288B3648C4F06F19C6C1551A@EXCH-C2.corp.cloudmark.com> <215EC5C2-A72E-461E-BF9E-1E291CDBD439@checkpoint.com>
In-Reply-To: <215EC5C2-A72E-461E-BF9E-1E291CDBD439@checkpoint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [websec] Same Origins and email
X-BeenThere: websec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Web Application Security Minus Authentication and Transport <websec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/websec>, <mailto:websec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/websec>
List-Post: <mailto:websec@ietf.org>
List-Help: <mailto:websec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/websec>, <mailto:websec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Dec 2011 19:42:42 -0000

> -----Original Message-----
> From: Yoav Nir [mailto:ynir@checkpoint.com]
> Sent: Monday, December 12, 2011 11:25 AM
> To: Murray S. Kucherawy
> Cc: websec@ietf.org
> Subject: Re: [websec] Same Origins and email
> 
> > What about something like Outlook or alpine, where we're not talking
> > about a web-based MUA but one that pulls from a local store?
> 
> file://localhost ?
> 
> Although I think HTML you get through the mail should not be scripted
> by files on your computer, so maybe each mail item should have its own
> origin.

I was thinking maybe "mailto:" followed by whatever address is parsed from the From: field.  The problem, of course, is that it's trivially forged.

Given that I come from the messaging side and not from the browser side, I'm trying to ensure I've got the idea here: Is the idea of web origins to inform the target server of URIs in the HTML document about where the request came from, a little more generally than what Referer does, and allowing chaining, thus permitting the server servicing that URI the choice to refuse or substitute the content where it determines the referral was likely fraudulent?  Or does it allow the user agent to make more informed choices about which URIs it is willing to dereference?  Or both?

Is it possible for a server to use web origins to list other web origins allowed to reference it?  Say, could a bank's reply to an <img src> tag include a list of authorized origins?  (That might be hard to secure, but I'm talking generally here.)

Basically, if there's a way to use this stuff to help reduce the attack surface in HTML email, I'd love to put it to use, and that's what I'm (pardon the pun) fishing around for here.

Thanks,
-MSK