SlideShare a Scribd company logo
HTML5 Security
William J. Edney
Technical Pursuit Inc.
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Clarification
• Much of what is termed “HTML5”, insofar
as new programming capability is
concerned, is really not HTML. It is really
more JavaScript API added to the browser.
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“Hot button” issue
• Much of ‘external facing’ computing is done
on the Web these days
• E-commerce
• Customer care
• Partner collaboration
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
What hasn’t changed:
Same Origin Model
• Core of web security
• Same host
• Same protocol
• Same port
• XMLHTTPRequest is bound by this model
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
What hasn’t changed:
Extensions / addons
• Browsers can get access to:
• Bookmarks
• File system
• Cross-origin XHR
• Require extra user permission to install
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“HTML5” additions
• Cross-Origin Resource Sharing (CORS)
• [Web, DOM, Local] Storage
• Indexed DB (supplants WebDB)
• Offline Apps (‘HTML5 manifest’)
• Geolocation API
• Downloadable Fonts
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“HTML5” additions
• Cross-window messaging (‘postMessage’)
• Filesystem APIs
• Device APIs (Camera, GPS, etc.)
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Future
• Web Crypto
• Web Real Time Communication (WebRTC)
• Today in Chrome and Firefox
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Relaxing same-origin
• document.domain property
• siteA.foo.com and siteB.foo.com can
become ‘foo.com’ and communicate
• JSONP
• HTML5: CORS
• HTML5: postMessage()
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Core issues
• No fine-grained security model
• ‘Same origin’ policy is the master for the
foreseeable future
• Some APIs prompt the user for permission
• Users are becoming overwhelmed
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• CORS
• For intranet/extranet data-sharing, use
specific domains - not
“Access-Control-Allow-Origin: *”
• [Web, DOM, Local] Storage
• Use encryption, if available
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• IndexedDB
• Use encryption, if available
• Offline Apps
• Geolocation API
• Intranet/Extranet: Use sparingly
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• Downloadable fonts:
• Intranet/Extranet: Don’t use them
• Cross-window messaging (‘postMessage’)
• Intranet/Extranet: Use sparingly
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• Filesystem APIs
• Intranet/Extranet: Don’t use them
• Device APIs
• Intranet/Extranet: Use sparingly
• x-frame-options HTTP header
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Future
• W3C has begun work on the “Content
Security Policy”
• Fine-grained, cross API, security
mechanism
• Currently a candidate recommendation
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Organizational policies
• Use different browsers (or browser
profiles) for tasks requiring different levels
of security
• IE for work, FF for play / personal
• Use work machine / browser only for work
• Use own device for personal
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Conclusion
• Browsers are becoming more powerful
• Users will upgrade
• Users will find ways around your attempts
to prevent them from upgrading
• As with much of IT security, the real
solution lies in education and organizational
policy
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Questions?
• Thanks!
Thursday, May 16, 13

More Related Content

KEY
ARTDM 171, Week 2: A Brief History + Web Basics
PDF
Dan Appelquist at BBC News Labs : "firefoxOS - the web, mobile, web apps"
PPT
Youth Dynamix
PPTX
Heavy Chef Session - Justin Stanford's presentation on Online Security
PDF
What can creativity do?
PPTX
A Message To Starbucks
PDF
DYNAMIX GROUP SLIDESHARE 2016
PDF
Heavy Chef March: Building Great Mobisites
ARTDM 171, Week 2: A Brief History + Web Basics
Dan Appelquist at BBC News Labs : "firefoxOS - the web, mobile, web apps"
Youth Dynamix
Heavy Chef Session - Justin Stanford's presentation on Online Security
What can creativity do?
A Message To Starbucks
DYNAMIX GROUP SLIDESHARE 2016
Heavy Chef March: Building Great Mobisites

Similar to HTML5 security (20)

KEY
ClubAJAX Basics - Server Communication
PPTX
Datasets, APIs, and Web Scraping
PDF
Drawing the Line with Browser Compatibility
PDF
Stabilising a large ibm connections environment
PPTX
Frontend State of the union
PDF
Firefox OS Workshop @ Serbia & Montenegro - Training
PDF
Danger! Danger! Your Mobile Applications Are Not Secure
PDF
Html5 Application Security
PDF
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
PDF
The Future of the web
PPTX
Codestrong 2012 breakout session introduction to mobile web and best practices
PDF
Future of the Web
PPTX
A Brave New World
PDF
Frontend development of the (current) future
ZIP
Building iPhone/Andriod Apps with Titanium Appcelerator for a Rails Backend
PDF
Designing & Building Secure Web APIs
PPT
Mobile code mining for discovery and exploits nullcongoa2013
PDF
Ch 10: Hacking Web Servers
PDF
04. Open Source Development Platforms.pdf
PDF
The 3 Top Techniques for Web Security Testing Using a Proxy
ClubAJAX Basics - Server Communication
Datasets, APIs, and Web Scraping
Drawing the Line with Browser Compatibility
Stabilising a large ibm connections environment
Frontend State of the union
Firefox OS Workshop @ Serbia & Montenegro - Training
Danger! Danger! Your Mobile Applications Are Not Secure
Html5 Application Security
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
The Future of the web
Codestrong 2012 breakout session introduction to mobile web and best practices
Future of the Web
A Brave New World
Frontend development of the (current) future
Building iPhone/Andriod Apps with Titanium Appcelerator for a Rails Backend
Designing & Building Secure Web APIs
Mobile code mining for discovery and exploits nullcongoa2013
Ch 10: Hacking Web Servers
04. Open Source Development Platforms.pdf
The 3 Top Techniques for Web Security Testing Using a Proxy
Ad

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Architecture types and enterprise applications.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Chapter 5: Probability Theory and Statistics
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
August Patch Tuesday
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
STKI Israel Market Study 2025 version august
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
The various Industrial Revolutions .pptx
PDF
Unlock new opportunities with location data.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
A novel scalable deep ensemble learning framework for big data classification...
Developing a website for English-speaking practice to English as a foreign la...
Architecture types and enterprise applications.pdf
Module 1.ppt Iot fundamentals and Architecture
Chapter 5: Probability Theory and Statistics
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DP Operators-handbook-extract for the Mautical Institute
Univ-Connecticut-ChatGPT-Presentaion.pdf
A review of recent deep learning applications in wood surface defect identifi...
August Patch Tuesday
O2C Customer Invoices to Receipt V15A.pptx
STKI Israel Market Study 2025 version august
Final SEM Unit 1 for mit wpu at pune .pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The various Industrial Revolutions .pptx
Unlock new opportunities with location data.pdf
What is a Computer? Input Devices /output devices
Web Crawler for Trend Tracking Gen Z Insights.pptx
CloudStack 4.21: First Look Webinar slides
A novel scalable deep ensemble learning framework for big data classification...
Ad

HTML5 security

  • 1. HTML5 Security William J. Edney Technical Pursuit Inc. Thursday, May 16, 13
  • 2. William J. Edney Technical Pursuit Inc. Clarification • Much of what is termed “HTML5”, insofar as new programming capability is concerned, is really not HTML. It is really more JavaScript API added to the browser. Thursday, May 16, 13
  • 3. William J. Edney Technical Pursuit Inc. “Hot button” issue • Much of ‘external facing’ computing is done on the Web these days • E-commerce • Customer care • Partner collaboration Thursday, May 16, 13
  • 4. William J. Edney Technical Pursuit Inc. What hasn’t changed: Same Origin Model • Core of web security • Same host • Same protocol • Same port • XMLHTTPRequest is bound by this model Thursday, May 16, 13
  • 5. William J. Edney Technical Pursuit Inc. What hasn’t changed: Extensions / addons • Browsers can get access to: • Bookmarks • File system • Cross-origin XHR • Require extra user permission to install Thursday, May 16, 13
  • 6. William J. Edney Technical Pursuit Inc. “HTML5” additions • Cross-Origin Resource Sharing (CORS) • [Web, DOM, Local] Storage • Indexed DB (supplants WebDB) • Offline Apps (‘HTML5 manifest’) • Geolocation API • Downloadable Fonts Thursday, May 16, 13
  • 7. William J. Edney Technical Pursuit Inc. “HTML5” additions • Cross-window messaging (‘postMessage’) • Filesystem APIs • Device APIs (Camera, GPS, etc.) Thursday, May 16, 13
  • 8. William J. Edney Technical Pursuit Inc. Future • Web Crypto • Web Real Time Communication (WebRTC) • Today in Chrome and Firefox Thursday, May 16, 13
  • 9. William J. Edney Technical Pursuit Inc. Relaxing same-origin • document.domain property • siteA.foo.com and siteB.foo.com can become ‘foo.com’ and communicate • JSONP • HTML5: CORS • HTML5: postMessage() Thursday, May 16, 13
  • 10. William J. Edney Technical Pursuit Inc. Core issues • No fine-grained security model • ‘Same origin’ policy is the master for the foreseeable future • Some APIs prompt the user for permission • Users are becoming overwhelmed Thursday, May 16, 13
  • 11. William J. Edney Technical Pursuit Inc. API Recommendations • CORS • For intranet/extranet data-sharing, use specific domains - not “Access-Control-Allow-Origin: *” • [Web, DOM, Local] Storage • Use encryption, if available Thursday, May 16, 13
  • 12. William J. Edney Technical Pursuit Inc. API Recommendations • IndexedDB • Use encryption, if available • Offline Apps • Geolocation API • Intranet/Extranet: Use sparingly Thursday, May 16, 13
  • 13. William J. Edney Technical Pursuit Inc. API Recommendations • Downloadable fonts: • Intranet/Extranet: Don’t use them • Cross-window messaging (‘postMessage’) • Intranet/Extranet: Use sparingly Thursday, May 16, 13
  • 14. William J. Edney Technical Pursuit Inc. API Recommendations • Filesystem APIs • Intranet/Extranet: Don’t use them • Device APIs • Intranet/Extranet: Use sparingly • x-frame-options HTTP header Thursday, May 16, 13
  • 15. William J. Edney Technical Pursuit Inc. Future • W3C has begun work on the “Content Security Policy” • Fine-grained, cross API, security mechanism • Currently a candidate recommendation Thursday, May 16, 13
  • 16. William J. Edney Technical Pursuit Inc. Organizational policies • Use different browsers (or browser profiles) for tasks requiring different levels of security • IE for work, FF for play / personal • Use work machine / browser only for work • Use own device for personal Thursday, May 16, 13
  • 17. William J. Edney Technical Pursuit Inc. Conclusion • Browsers are becoming more powerful • Users will upgrade • Users will find ways around your attempts to prevent them from upgrading • As with much of IT security, the real solution lies in education and organizational policy Thursday, May 16, 13
  • 18. William J. Edney Technical Pursuit Inc. Questions? • Thanks! Thursday, May 16, 13