-
Notifications
You must be signed in to change notification settings - Fork 84
Scope issue #109
Comments
I use Mozilla's Public Suffix List (which is used by browser vendors), and
This essentially means that browsers should not set cookies on |
Interesting, thank you. |
For the record, I guess a better explanation is simply that as per PSL, Incidentally, this can be entered in the Rule manager:
or even
But this currently won't be reflected in the matrix, because the Is this something we want in HTTPSB? Doubtful: I picture a malicious recipe which whitelist a whole TLD (say So I will close this one because of all the above, but if you think this is a feature to have you can reopen it and we can debate more about how this could be implemented without impacting security of less geeky users. |
Go to:
http://isecpartners.github.io/fuzzing/vulnerabilities/2013/12/30/vlc-vulnerability.html
Click on the * to decide scope.
Options are:
http://isecpartners.github.io
http://*.isecpartners.github.io
Ideally it would be: http://*.github.io , at least that makes sense to me?
Or at least, that should be included.
Seems like a behavior issue, when there is a domain and a subdomain the subdomain should be *'d as an option.
Example of it done properly: movies.netflix.com
Options:
https://*.netflix.com
https://movies.netflix.com
I hope this is clear enough.
The text was updated successfully, but these errors were encountered: