From b3adb90bf4cdfbea65fdd1025ca774a03b213680 Mon Sep 17 00:00:00 2001 From: James Graham Date: Fri, 18 Mar 2022 14:47:32 +0000 Subject: [PATCH] Add some extra detail about allowing external network connections. This doesn't add normative requirements, but encourages implementors to ship with secure defaults, whilst mentioning that there are real-world use cases which require remote ends to accept connections coming from somewhere other than localhost. --- index.html | 37 ++++++++++++++++++++----------------- 1 file changed, 20 insertions(+), 17 deletions(-) diff --git a/index.html b/index.html index a8bd09a8..bd7af0fe 100644 --- a/index.html +++ b/index.html @@ -465,11 +465,14 @@

Processing model

Then send an error with error code unknown error, and jump to step 1.

-

Rejecting connections with unexpected values in the - Host header prevents DNS rebinding attacks. Implementations can opt - to provide more stringent controls where appropriate, for example - only accepting connections when the host value - corresponds to a loopback interface [[RFC5735]].

+

Rejecting connections with unexpected values in the + Host header prevents DNS rebinding attacks. Implementations + can opt to provide more stringent controls where appropriate, for + example only accepting connections when the host value + corresponds to a loopback interface [[RFC5735]]. Further guidance + for implementors is given in the security + section.

+
  • If origin is not undefined and is not identical to an Origin header value that the implementation has been @@ -10494,18 +10497,18 @@

    Security

    and that WebDriver remains disabled in publicly consumed versions of the user agent. -

    To prevent arbitrary machines on the network - from connecting and creating sessions, - it is suggested that only connections from - loopback devices are allowed by default. - -

    The remote end can include - a configuration option to limit - the accepted IP range allowed to connect and make requests. - The default setting for this might be - to limit connections to the IPv4 localhost - CIDR range 127.0.0.0/8 - and the IPv6 localhost address ::1. [[RFC4632]] +

    To prevent arbitrary machines on the network from connecting and + creating sessions, it is suggested that only connections from + loopback devices are allowed by default. However, testing setups + commonly put the remote end and local end on different + network hosts. Users deploying such a setup are encouraged to + restrict access to the remote end to the greatest extent possible, + either by restricting network connections to trusted hosts (e.g. in + the case of a lab setting, or the remote end running in a containers + on the same bridged network), or by routing all connections through + an intermediary node that provides authorization and + authentication. Remote end implementors are encouraged to + provide minimal, opt-in, configuration to support these scenarios.

    It is also suggested that user agents make an effort to visually distinguish