TOC |
|
This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on July 26, 2009.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
This document defines the HTTP Origin header. The Origin header is added by the user agent to describe the security context that initiated an HTTP request. HTTP servers can use the Origin header to defend themselves against Cross-Site Request Forgery (CSRF) attacks.
1.
Introduction
2.
Origin
3.
Comparing Origins
4.
Serializing Origins
4.1.
Unicode Serialization of an Origin
4.2.
ASCII Serialization of an Origin
5.
User Agent Behavior
6.
HTTP Server Behavior
7.
Privacy Considerations
8.
Security Considerations
9.
IANA Considerations
10.
TODO
§
Authors' Addresses
TOC |
This document describes the HTTP Origin header. The Origin header identifies the security context that initiated an HTTP request and can be used by Web sites to mitigate cross-site request forgery (CSRF) vulnerabilities.
TOC |
The following algoritm MUST be used to compute the origin of a URL.
Implementations MAY define other types of origins in addition to the scheme/host/port tuple type defined above. (For example, user agents could implement globally unique origins or certificate-based origins.)
TOC |
Implementations MUST use the following algorithm to test whether two origins are the "same origin".
TOC |
TOC |
Implementations MUST using the following algorithm to compute the Unicode serialization of an origin:
(i.e., the character sequence U+006E, U+0075, U+006C, U+006C) and abort these steps.null
TOC |
Implementations MUST using the following algorithm to compute the ASCII serialization of an origin:
(i.e., the character sequence U+006E, U+0075, U+006C, U+006C) and abort these steps.null
TOC |
Whenever a user agent issues an HTTP request, the user agent MAY include an HTTP header named "Origin".
Whenever a user agent issues an HTTP request whose method is neither "GET" nor "HEAD", the user agent MUST include exactly one HTTP header named "Origin".
Whenever a user agent issues an HTTP request that contains an HTTP header named "Origin", the value of that header MUST either be
Whenever a user agent issues an HTTP request that contains an HTTP header named "Origin", if the request was initiated on behalf of an origin, the user agent SHOULD use the ASCII serialization of that origin as the value of the Origin header.
Note: This behavior differs from that of the HTTP Referer header, which user agents often suppress when an origin with an "https" scheme issues a request for a URL with an "http" scheme.
If a user agent issues an HTTP request in reaction to an HTTP redirect, the Origin header MUST contain the same value as the Origin header in the HTTP request that generated the redirect.
TOC |
HTTP Servers MAY use the Origin header to "defend themselves against CSRF attacks." Such servers are known as "participating servers" in this section.
Let the /origin white list/ of a participating server be a set of strings selected by the operator of that server.
The string "null" MUST NOT be a member of the /origin white list/ for any participating server.
Example: The origin white list for the example.com Web server could be the strings "http://example.com", "https://example.com", "http://www.example.com", and "https://www.example.com".
A participating server MUST use the following algorithm when determining whether to modify state in response to an HTTP request:
Example: A Web server could modify state in response to POST requests that lack an Origin header (because these requests are sent by non-supporting user agents) and could modify state in response to POST requests that have an Origin header of "http://example.com", "https://example.com", "http://www.example.com", or "https://www.example.com".
A participating server MUST NOT instruct a user agent to issue an HTTP request for a given URL unless the following algorithm returns "Safe".
Example: A Web server would be vulnerable to a CSRF attack if it responded to an HTTP request with HTML that generated a POST request to http://attacker.com/ because the attacker's server could respond with an HTTP 307 status and redirect the POST back to the original server.
TOC |
This section is not normative.
The Origin header improves on the Referer header by respecting the user's privacy: The Origin header includes only the information required to identify the principal that initiated the request (typically the scheme, host, and port of initiating origin). In particular, the Origin header does not contain the path or query portions of the URL included in the Referer header that invade privacy without providing additional security.
The Origin header also improves on the Referer header by NOT leaking intranet host names to external Web sites when a user follows a hyperlink from an intranet host to an external site because hyperlinks generate GET requests.
TOC |
This section is not normative.
Because a supporting user agent will always include the Origin header when making HTTP requests, HTTP servers can detect that a request was initiated by a supporting user agent by observing the presence of the header. This design prevents an attacker from making a supporting user agent appear to be a non-supporting user agent. Unlike the Referer header, which is absent when suppressed by the user agent, the Origin header takes on the value "null" when suppressed by the user agent.
In existing user agents, The Origin header can be spoofed for same-site XMLHttpRequests. Sites that rely only on network connectivity for authentication should use a DNS rebinding defense, such as validating the HTTP Host header, in addition to CSRF protection.
TOC |
TODO: The "Origin" header should be registered.
TOC |
Think about how this interacts with proxies.
Think about how this interacts with caches.
TOC |
Adam Barth | |
University of California, Berkeley | |
Email: | abarth@eecs.berkeley.edu |
URI: | http://www.adambarth.com/ |
Collin Jackson | |
Stanford University | |
Email: | collinj@cs.stanford.edu |
URI: | http://www.collinjackson.com/ |
Ian Hickson | |
Google, Inc. | |
Email: | ian@hixie.ch |
URI: | http://ln.hixie.ch/ |