[LINK] RFC: AJAX Depredations
Roger Clarke
Roger.Clarke at xamax.com.au
Mon Apr 2 15:54:34 AEST 2007
I'm finalising a submission to ASIC about 'consumer device security'.
It tries to explain - to bankers and lawyers - why consumers can't be
lumbered with unreasonable responsibilities to secure their desktops
and laptops, let alone handhelds. The URL for the previous draft is
below. (The slightly more technical description I've put in another
paper, for eCommerce types, is at the very bottom).
The current iteration of the short section on AJAX is as follows.
Proposals for correction and improvement greatly appreciated!!
"A recent development is an extension to the Web protocol called
XMLHttpRequest (http://en.wikipedia.org/wiki/XMLHttpRequest). This
was originally devised by Microsoft but has since been widely
adopted. It extends the capabilities available to programmers, and
reduces the extent to which the user does, or even can, understand
what their device is doing. A family of development techniques
referred to as AJAX takes advantage of this extended, more powerful
Web protocol.
"The AJAX approach enables closer control by the programmer of the
user's visual experience, because small parts of the display can be
changed, without the jolt of an intervening blank window. This is
achieved by constructing an 'Ajax engine' within the browser, to
intercept traffic to and from the web-server. Control of the
browser-window by code delivered by an application running on the
server represents subversion of the concept of the Web and hijack of
the functions of the browser. The power it offers provides
programmers with the capacity to manipulate consumer devices, and is
a boon for attackers.
...
"It appears that even highly technically literate consumers may be
either unable to preclude AJAX techniques from intruding into their
devices, or unable to do so without abandoning access to a wide range
of services. In particular, there appears to be no mainstream way in
which a consumer can permit AJAX techniques under specific
circumstances only (such as from a trusted supplier like their bank)
without leaving their device open to all comers.
"The alternative of using ancient browser-versions, or intentionally
cut-down browsers that do not support key features on which AJAX
depends, incurs considerable disadvantages. Most web-site developers
design applications only to run on very recent browser-versions (or,
in remarkably many instances, only on the most recent versions of
MSIE). Old and cut-down versions of browsers therefore quickly
become unusable on many sites; and hence there is a built-in and
powerful disincentive working against consumers using less vulnerable
browsers."
__________________________________________________________________________
The previous version of the submission is at:
On the Possibility of Consumer Device Security
http://www.anu.edu.au/people/Roger.Clarke/II/ConsDevSecy.html
__________________________________________________________________________
Slightly more techo text, from:
Towards an Understanding of the Web 2.0 Notion
http://www.anu.edu.au/people/Roger.Clarke/EC/Web2C.html#AltT
The key example of such a lightweight model is the approach referred
to as AJAX, which is shorthand for 'Asynchronous JavaScript and XML'.
The term is of recent origin (Garrett 2005), but describes a pattern
that has been emergent for some years and represents a further
improvement on longstanding techniques collectively referred to as
Dynamic HTML.
The AJAX approach utilises well-established tools such as HTML, CSS,
XML and the JavaScript/ECMAScript family of client-side languages.
The key difference is the involvement of the more recent
XMLHttpRequest Method within HTTP. This supports data retrieval from
the server 'asynchronously', i.e. without forcing a refesh of the
entire browser-window. The technique enables closer control by the
programmer of the user's visual experience, because small parts of
the display can be changed, without the jolt of an intervening blank
window. It is argued that this enables quicker response and improved
usability (although that is subject to debate).
The means whereby this is achieved is by constructing an 'Ajax
engine' within the browser, such that requests and responses are
intercepted and processed on the client-side. An important motivation
for Ajax developers is to reduce the complexity caused by proprietary
features in Microsoft's Internet Explorer, such that a single
application can work consistently on all client-platforms (just as
the Web was originally envisaged to do).
From the user's perspective, however, control of the browser-window
by code delivered by an application running on the server represents
subversion of the concept of the Web and hijack of the functions of
the browser.
--
Roger Clarke http://www.anu.edu.au/people/Roger.Clarke/
Xamax Consultancy Pty Ltd 78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au http://www.xamax.com.au/
Visiting Professor in Info Science & Eng Australian National University
Visiting Professor in the eCommerce Program University of Hong Kong
Visiting Professor in the Cyberspace Law & Policy Centre Uni of NSW
More information about the Link
mailing list