Blink: Intent to Implement and Ship: 'unsafe-hashed-attributes' in CSP3https://groups.google.com/a/chromium.org/d/msg/blink-dev/bUAhkdsrmqE/nimnFDG3BAAJ …
-
-
One of the proposals was to include event handler names, but this seems more complicated for little benefit so I'd prefer to avoid it.
-
It would disable a lot of the code-reuse attack vectors.
-
For common EHs like onclick, onload, onmouse* this seems tough b/c the attacker controls the DOM and can dupe the user into causing events.
-
Yes, but it prevents the attacker from reusing an onclick handler in an onload handler.
-
The attacker can add a full-page overlay so any click will trigger the `onclick' EH; it's hard to prevent it, IMO not worth trying.
-
Removing user interaction makes attacks easier. I have more examples, but twitter is not suitable for explaining those.
-
I agree
and would definitely encourage you to comment on the spec (either one of the GitHub issues linked above, or just start a new one!) - 6 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.