diff --git a/index.html b/index.html index 3797aa57..96849e0b 100644 --- a/index.html +++ b/index.html @@ -465,11 +465,14 @@
Then send an error with error code unknown error, and jump to step 1.
-Rejecting connections with unexpected values in the - Host header prevents DNS rebinding attacks. Implementations can opt - to provide more stringent controls where appropriate, for example - only accepting connections when the host value - corresponds to a loopback interface [[RFC5735]].
+Rejecting connections with unexpected values in the + Host header prevents DNS rebinding attacks. Implementations + can opt to provide more stringent controls where appropriate, for + example only accepting connections when the host value + corresponds to a loopback interface [[RFC5735]]. Further guidance + for implementors is given in the security + section.
+If origin is not undefined and is not identical to an Origin header value that the implementation has been @@ -10494,18 +10497,18 @@
To prevent arbitrary machines on the network - from connecting and creating sessions, - it is suggested that only connections from - loopback devices are allowed by default. - -
The remote end can include
- a configuration option to limit
- the accepted IP range allowed to connect and make requests.
- The default setting for this might be
- to limit connections to the IPv4 localhost
- CIDR range 127.0.0.0/8
- and the IPv6 localhost address ::1
. [[RFC4632]]
+
To prevent arbitrary machines on the network from connecting and + creating sessions, it is suggested that only connections from + loopback devices are allowed by default. However, testing setups + commonly put the remote end and local end on different + network hosts. Users deploying such a setup are encouraged to + restrict access to the remote end to the greatest extent possible, + either by restricting network connections to trusted hosts (e.g. in + the case of a lab setting, or the remote end running in a containers + on the same bridged network), or by routing all connections through + an intermediary node that provides authorization and + authentication. Remote end implementors are encouraged to + provide minimal, opt-in, configuration to support these scenarios.
It is also suggested that user agents make an effort to visually distinguish