aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJonas Wielicki <j.wielicki@sotecware.net>2017-10-12 08:18:48 +0200
committerJonas Wielicki <j.wielicki@sotecware.net>2017-10-12 08:19:31 +0200
commit41778634cc41770191002ffa9ec0b1d08d0f183a (patch)
treecd121931dd58023646e22cdb03533a2d95ff4b33
parent746cbc7f38fac33b9eca4dd7f80327f4c52e3a92 (diff)
XEP-0071: make security considations much clearer
-rw-r--r--xep-0071.xml9
1 files changed, 8 insertions, 1 deletions
diff --git a/xep-0071.xml b/xep-0071.xml
index cc6c0ff..ebfe2ce 100644
--- a/xep-0071.xml
+++ b/xep-0071.xml
@@ -37,6 +37,12 @@
</schemaloc>
&stpeter;
<revision>
+ <version>1.5.2</version>
+ <date>2017-10-12</date>
+ <initials>jwi</initials>
+ <remark><p>Clarify security considerations.</p></remark>
+ </revision>
+ <revision>
<version>1.5.1</version>
<date>2016-01-05</date>
<initials>XEP Editor (mam)</initials>
@@ -838,7 +844,8 @@ That seems fine to me.
</section1>
<section1 topic='Security Considerations' anchor='security'>
<section2 topic='Malicious Objects' anchor='security-code'>
- <p>The exclusion of scripts, applets, binary objects, and other potentially executable code from XHTML-IM reduces the risk of exposure to harmful or malicious objects caused by inclusion of XHTML content. To further reduce the risk of such exposure, an implementation MAY choose to:</p>
+ <p>While scripts, applets, binary objects and other potentially executable code is excluded from the profiles used in XHTML-IM, malicious entities still may inject those and thus exploit entities which rely on this exclusion. Entities thus MUST assume that inbound XHTML-IM may be mailicious and MUST sanitize it according to the profile used, by ignoring elements and removing attributes as needed.</p>
+ <p>To further reduce the risk of such exposure, an implementation MAY choose to:</p>
<ul>
<li>Not make hyperlinks clickable</li>
<li>Not fetch or present images but instead show only the 'alt' text.</li>