Security Vulnerability Research & Defense : IE 8 XSS Filter Architecture / Implementation(情報元のブックマーク数)

さすがMicrosoft、IE8に実装するXSS Filterのゴールが出ていますが現実的で本当のゴールですね

早くないと使わない、XSS Filter自体はセキュアである必要がある、XSS Filter互換性が無いといけない。

The XSS Filter must be compatible.

  • There should be minimal, ideally zero, disruption to benign content/data. We might be able to achieve effective filtering if we were to drop all non-alphanumeric characters from input, however this would be an unrealistic and overbearing solution. Any solution that involves directly modifying request URLs is likely to persist corrupted data on the server-side. Similarly, approaches that would ask the user questions they can’t answer or block entire pages are not acceptable.

The XSS Filter must be secure.

  • In general it must not be possible to subvert the filter by modifying attacks that are otherwise intentionally blocked. Although the XSS Filter cannot mitigate all possible XSS attacks, it can win some critical battles decisively. We can push as far as possible to maximize the XSS Filter’s effectiveness as long as we are also careful not to compromise compatibility or performance.

The XSS Filter must be performant.

  • Users prefer a fast browser to a slow one, even if the slower one is “more secure.” So some approaches are simply not acceptable for performance reasons. For example, creating an extra instance of the browser rendering engine for each navigation would be too impactful to consider.
http://blogs.technet.com/swi/archive/2008/08/19/ie-8-xss-filter-architecture-implementation.aspx

screenshot