SlideShare a Scribd company logo
1 of 18
Download to read offline
HTML5 Security
William J. Edney
Technical Pursuit Inc.
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Clarification
• Much of what is termed “HTML5”, insofar
as new programming capability is
concerned, is really not HTML. It is really
more JavaScript API added to the browser.
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“Hot button” issue
• Much of ‘external facing’ computing is done
on the Web these days
• E-commerce
• Customer care
• Partner collaboration
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
What hasn’t changed:
Same Origin Model
• Core of web security
• Same host
• Same protocol
• Same port
• XMLHTTPRequest is bound by this model
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
What hasn’t changed:
Extensions / addons
• Browsers can get access to:
• Bookmarks
• File system
• Cross-origin XHR
• Require extra user permission to install
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“HTML5” additions
• Cross-Origin Resource Sharing (CORS)
• [Web, DOM, Local] Storage
• Indexed DB (supplants WebDB)
• Offline Apps (‘HTML5 manifest’)
• Geolocation API
• Downloadable Fonts
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
“HTML5” additions
• Cross-window messaging (‘postMessage’)
• Filesystem APIs
• Device APIs (Camera, GPS, etc.)
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Future
• Web Crypto
• Web Real Time Communication (WebRTC)
• Today in Chrome and Firefox
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Relaxing same-origin
• document.domain property
• siteA.foo.com and siteB.foo.com can
become ‘foo.com’ and communicate
• JSONP
• HTML5: CORS
• HTML5: postMessage()
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Core issues
• No fine-grained security model
• ‘Same origin’ policy is the master for the
foreseeable future
• Some APIs prompt the user for permission
• Users are becoming overwhelmed
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• CORS
• For intranet/extranet data-sharing, use
specific domains - not
“Access-Control-Allow-Origin: *”
• [Web, DOM, Local] Storage
• Use encryption, if available
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• IndexedDB
• Use encryption, if available
• Offline Apps
• Geolocation API
• Intranet/Extranet: Use sparingly
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• Downloadable fonts:
• Intranet/Extranet: Don’t use them
• Cross-window messaging (‘postMessage’)
• Intranet/Extranet: Use sparingly
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
API Recommendations
• Filesystem APIs
• Intranet/Extranet: Don’t use them
• Device APIs
• Intranet/Extranet: Use sparingly
• x-frame-options HTTP header
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Future
• W3C has begun work on the “Content
Security Policy”
• Fine-grained, cross API, security
mechanism
• Currently a candidate recommendation
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Organizational policies
• Use different browsers (or browser
profiles) for tasks requiring different levels
of security
• IE for work, FF for play / personal
• Use work machine / browser only for work
• Use own device for personal
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Conclusion
• Browsers are becoming more powerful
• Users will upgrade
• Users will find ways around your attempts
to prevent them from upgrading
• As with much of IT security, the real
solution lies in education and organizational
policy
Thursday, May 16, 13
William J. Edney Technical Pursuit Inc.
Questions?
• Thanks!
Thursday, May 16, 13

More Related Content

Similar to HTML5 security

Drawing the Line with Browser Compatibility
Drawing the Line with Browser CompatibilityDrawing the Line with Browser Compatibility
Drawing the Line with Browser Compatibility
jsmith92
 
Firefox OS Workshop @ Serbia & Montenegro - Training
Firefox OS Workshop @ Serbia & Montenegro - TrainingFirefox OS Workshop @ Serbia & Montenegro - Training
Firefox OS Workshop @ Serbia & Montenegro - Training
Jan Jongboom
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practices
Axway Appcelerator
 

Similar to HTML5 security (20)

ClubAJAX Basics - Server Communication
ClubAJAX Basics - Server CommunicationClubAJAX Basics - Server Communication
ClubAJAX Basics - Server Communication
 
Datasets, APIs, and Web Scraping
Datasets, APIs, and Web ScrapingDatasets, APIs, and Web Scraping
Datasets, APIs, and Web Scraping
 
Drawing the Line with Browser Compatibility
Drawing the Line with Browser CompatibilityDrawing the Line with Browser Compatibility
Drawing the Line with Browser Compatibility
 
Stabilising a large ibm connections environment
Stabilising a large ibm connections environmentStabilising a large ibm connections environment
Stabilising a large ibm connections environment
 
Frontend State of the union
Frontend State of the unionFrontend State of the union
Frontend State of the union
 
Firefox OS Workshop @ Serbia & Montenegro - Training
Firefox OS Workshop @ Serbia & Montenegro - TrainingFirefox OS Workshop @ Serbia & Montenegro - Training
Firefox OS Workshop @ Serbia & Montenegro - Training
 
Danger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not SecureDanger! Danger! Your Mobile Applications Are Not Secure
Danger! Danger! Your Mobile Applications Are Not Secure
 
Html5 Application Security
Html5 Application SecurityHtml5 Application Security
Html5 Application Security
 
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
CIW Lab with CoheisveFT: Get started in public cloud - Part 1 Cloud & Virtual...
 
The Future of the web
The Future of the webThe Future of the web
The Future of the web
 
Codestrong 2012 breakout session introduction to mobile web and best practices
Codestrong 2012 breakout session   introduction to mobile web and best practicesCodestrong 2012 breakout session   introduction to mobile web and best practices
Codestrong 2012 breakout session introduction to mobile web and best practices
 
Future of the Web
Future of the WebFuture of the Web
Future of the Web
 
A Brave New World
A Brave New WorldA Brave New World
A Brave New World
 
Frontend development of the (current) future
Frontend development of the (current) futureFrontend development of the (current) future
Frontend development of the (current) future
 
Building iPhone/Andriod Apps with Titanium Appcelerator for a Rails Backend
Building iPhone/Andriod Apps with Titanium Appcelerator for a Rails BackendBuilding iPhone/Andriod Apps with Titanium Appcelerator for a Rails Backend
Building iPhone/Andriod Apps with Titanium Appcelerator for a Rails Backend
 
Designing & Building Secure Web APIs
Designing & Building Secure Web APIsDesigning & Building Secure Web APIs
Designing & Building Secure Web APIs
 
Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013Mobile code mining for discovery and exploits nullcongoa2013
Mobile code mining for discovery and exploits nullcongoa2013
 
Ch 10: Hacking Web Servers
Ch 10: Hacking Web ServersCh 10: Hacking Web Servers
Ch 10: Hacking Web Servers
 
The 3 Top Techniques for Web Security Testing Using a Proxy
The 3 Top Techniques for Web Security Testing Using a ProxyThe 3 Top Techniques for Web Security Testing Using a Proxy
The 3 Top Techniques for Web Security Testing Using a Proxy
 
Fast-paced Introduction to Android Internals
Fast-paced Introduction to Android InternalsFast-paced Introduction to Android Internals
Fast-paced Introduction to Android Internals
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

HTML5 security

  • 1. HTML5 Security William J. Edney Technical Pursuit Inc. Thursday, May 16, 13
  • 2. William J. Edney Technical Pursuit Inc. Clarification • Much of what is termed “HTML5”, insofar as new programming capability is concerned, is really not HTML. It is really more JavaScript API added to the browser. Thursday, May 16, 13
  • 3. William J. Edney Technical Pursuit Inc. “Hot button” issue • Much of ‘external facing’ computing is done on the Web these days • E-commerce • Customer care • Partner collaboration Thursday, May 16, 13
  • 4. William J. Edney Technical Pursuit Inc. What hasn’t changed: Same Origin Model • Core of web security • Same host • Same protocol • Same port • XMLHTTPRequest is bound by this model Thursday, May 16, 13
  • 5. William J. Edney Technical Pursuit Inc. What hasn’t changed: Extensions / addons • Browsers can get access to: • Bookmarks • File system • Cross-origin XHR • Require extra user permission to install Thursday, May 16, 13
  • 6. William J. Edney Technical Pursuit Inc. “HTML5” additions • Cross-Origin Resource Sharing (CORS) • [Web, DOM, Local] Storage • Indexed DB (supplants WebDB) • Offline Apps (‘HTML5 manifest’) • Geolocation API • Downloadable Fonts Thursday, May 16, 13
  • 7. William J. Edney Technical Pursuit Inc. “HTML5” additions • Cross-window messaging (‘postMessage’) • Filesystem APIs • Device APIs (Camera, GPS, etc.) Thursday, May 16, 13
  • 8. William J. Edney Technical Pursuit Inc. Future • Web Crypto • Web Real Time Communication (WebRTC) • Today in Chrome and Firefox Thursday, May 16, 13
  • 9. William J. Edney Technical Pursuit Inc. Relaxing same-origin • document.domain property • siteA.foo.com and siteB.foo.com can become ‘foo.com’ and communicate • JSONP • HTML5: CORS • HTML5: postMessage() Thursday, May 16, 13
  • 10. William J. Edney Technical Pursuit Inc. Core issues • No fine-grained security model • ‘Same origin’ policy is the master for the foreseeable future • Some APIs prompt the user for permission • Users are becoming overwhelmed Thursday, May 16, 13
  • 11. William J. Edney Technical Pursuit Inc. API Recommendations • CORS • For intranet/extranet data-sharing, use specific domains - not “Access-Control-Allow-Origin: *” • [Web, DOM, Local] Storage • Use encryption, if available Thursday, May 16, 13
  • 12. William J. Edney Technical Pursuit Inc. API Recommendations • IndexedDB • Use encryption, if available • Offline Apps • Geolocation API • Intranet/Extranet: Use sparingly Thursday, May 16, 13
  • 13. William J. Edney Technical Pursuit Inc. API Recommendations • Downloadable fonts: • Intranet/Extranet: Don’t use them • Cross-window messaging (‘postMessage’) • Intranet/Extranet: Use sparingly Thursday, May 16, 13
  • 14. William J. Edney Technical Pursuit Inc. API Recommendations • Filesystem APIs • Intranet/Extranet: Don’t use them • Device APIs • Intranet/Extranet: Use sparingly • x-frame-options HTTP header Thursday, May 16, 13
  • 15. William J. Edney Technical Pursuit Inc. Future • W3C has begun work on the “Content Security Policy” • Fine-grained, cross API, security mechanism • Currently a candidate recommendation Thursday, May 16, 13
  • 16. William J. Edney Technical Pursuit Inc. Organizational policies • Use different browsers (or browser profiles) for tasks requiring different levels of security • IE for work, FF for play / personal • Use work machine / browser only for work • Use own device for personal Thursday, May 16, 13
  • 17. William J. Edney Technical Pursuit Inc. Conclusion • Browsers are becoming more powerful • Users will upgrade • Users will find ways around your attempts to prevent them from upgrading • As with much of IT security, the real solution lies in education and organizational policy Thursday, May 16, 13
  • 18. William J. Edney Technical Pursuit Inc. Questions? • Thanks! Thursday, May 16, 13