Which, from my perspective, is justification to disable reading the sensor
until it can be implemented in a way that prevents the cross-origin
stealing attack. Users shouldn't have to worry about this.

Haik

On Wed, Apr 26, 2017 at 8:28 AM, Ehsan Akhgari <ehsan.akhg...@gmail.com>
wrote:

> On 04/25/2017 08:26 PM, Salvador de la Puente wrote:
>
>> So the risk is not that high since if the image is not protected I can
>> get it and do evil things without requiring the Light Sensor API. Isn't it?
>>
>
> No, the risk is extremely high.
>
> Here is a concrete example.  Some banks give their users scanned copies of
> their cheques (including secret financial information) as cookie protected
> images.  Browsers already have protections in place that prevent
> cross-origin pages from reading the pixel values of these images by
> tainting such images and remembering that an image is coming from such a
> source and preventing the contents of such a tainted image to be read out
> through an API that gives you access to raw pixel values.  Merely uploading
> the URL of such an image to the evil.com server doesn't help the attacker
> since they won't have access to the user's credentials on the server side.
> The attack vector being discussed here introduces a new vulnerability
> vector for websites to try to steal sensitive information like this in ways
> that currently isn't possible.
>
>
>> On Wed, Apr 26, 2017 at 1:30 AM, Eric Rescorla <e...@rtfm.com <mailto:
>> e...@rtfm.com>> wrote:
>>
>>
>>
>>     On Tue, Apr 25, 2017 at 3:40 PM, Salvador de la Puente
>>     <sdelapue...@mozilla.com <mailto:sdelapue...@mozilla.com>> wrote:
>>
>>         The article says:
>>
>>         Embed an image from the attacked domain; generally this will
>>         be a resource
>>         > which varies for different authenticated users such as the
>>         logged-in user’s
>>         > avatar or a security code.
>>         >
>>
>>         And then refers all the steps to this image (binarizing,
>>         expand and measure
>>         per pixel) but, If I can embed that image, it is because I
>>         know the URL for
>>         it and the proper auth tokens if it is protected. In that
>>         case, why to not
>>         simply steal the image?
>>
>>
>>     The simple version of this is that the image is cookie protected.
>>
>>     -Ekr
>>
>>
>>         On Wed, Apr 26, 2017 at 12:23 AM, Jonathan Kingston
>>         <j...@mozilla.com <mailto:j...@mozilla.com>> wrote:
>>
>>         > Auth related images are the attack vector, that and history
>>         attacks on
>>         > same domain.
>>         >
>>         > On Tue, Apr 25, 2017 at 11:17 PM, Salvador de la Puente <
>>         > sdelapue...@mozilla.com <mailto:sdelapue...@mozilla.com>>
>> wrote:
>>         >
>>         >> Sorry for my ignorance but, in the case of Stealing
>>         cross-origin
>>         >> resources,
>>         >> I don't get the point of the attack. If have the ability to
>>         embed the
>>         >> image
>>         >> in step 1, why to not simply send this to evil.com
>>         <http://evil.com> for further
>>         >> processing?
>>         >> How it is possible for evil.com <http://evil.com> to get
>>         access to protected resources?
>>         >>
>>         >> On Tue, Apr 25, 2017 at 8:04 PM, Ehsan Akhgari
>>         <ehsan.akhg...@gmail.com <mailto:ehsan.akhg...@gmail.com>>
>>         >> wrote:
>>         >>
>>         >> > On 04/25/2017 10:25 AM, Andrew Overholt wrote:
>>         >> >
>>         >> >> On Tue, Apr 25, 2017 at 9:35 AM, Eric Rescorla
>>         <e...@rtfm.com <mailto:e...@rtfm.com>> wrote:
>>         >> >>
>>         >> >> Going back to Jonathan's (I think) question. Does anyone
>>         use this at
>>         >> all
>>         >> >>> in
>>         >> >>> the field?
>>         >> >>>
>>         >> >>> Chrome's usage metrics say <= 0.0001% of page loads:
>>         >> >>
>>         https://www.chromestatus.com/metrics/feature/popularity#Ambi
>>         <https://www.chromestatus.com/metrics/feature/popularity#Ambi>
>>         >> >> entLightSensorConstructor.
>>         >> >>
>>         >> >
>>         >> > This is the new version of the spec which we don't ship.
>>         >> >
>>         >> >
>>         >> > We are going to collect telemetry in
>>         >> >> https://bugzilla.mozilla.org/show_bug.cgi?id=1359124
>>         <https://bugzilla.mozilla.org/show_bug.cgi?id=1359124>.
>>         >> >> _______________________________________________
>>         >> >> dev-platform mailing list
>>         >> >> dev-platform@lists.mozilla.org
>>         <mailto:dev-platform@lists.mozilla.org>
>>         >> >> https://lists.mozilla.org/listinfo/dev-platform
>>         <https://lists.mozilla.org/listinfo/dev-platform>
>>         >> >>
>>         >> >
>>         >> > _______________________________________________
>>         >> > dev-platform mailing list
>>         >> > dev-platform@lists.mozilla.org
>>         <mailto:dev-platform@lists.mozilla.org>
>>         >> > https://lists.mozilla.org/listinfo/dev-platform
>>         <https://lists.mozilla.org/listinfo/dev-platform>
>>         >> >
>>         >>
>>         >>
>>         >>
>>         >> --
>>         >> <salva />
>>         >> _______________________________________________
>>         >> dev-platform mailing list
>>         >> dev-platform@lists.mozilla.org
>>         <mailto:dev-platform@lists.mozilla.org>
>>         >> https://lists.mozilla.org/listinfo/dev-platform
>>         <https://lists.mozilla.org/listinfo/dev-platform>
>>         >>
>>         >
>>         >
>>
>>
>>         --
>>         <salva />
>>         _______________________________________________
>>         dev-platform mailing list
>>         dev-platform@lists.mozilla.org
>>         <mailto:dev-platform@lists.mozilla.org>
>>         https://lists.mozilla.org/listinfo/dev-platform
>>         <https://lists.mozilla.org/listinfo/dev-platform>
>>
>>
>>
>>
>>
>> --
>> <salva />
>>
>
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to