11.07.2015 Views

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

Network Working Group R. Fielding Request for Comments: 2616 ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

designers and implementors be particularly careful in this area.History shows that errors in this area often create serious securityand/or privacy problems and generate highly adverse publicity <strong>for</strong> theimplementor's company.15.1.1 Abuse of Server Log In<strong>for</strong>mationA server is in the position to save personal data about a user'srequests which might identify their reading patterns or subjects ofinterest. This in<strong>for</strong>mation is clearly confidential in nature and itshandling can be constrained by law in certain countries. People usingthe HTTP protocol to provide data are responsible <strong>for</strong> ensuring thatsuch material is not distributed without the permission of anyindividuals that are identifiable by the published results.15.1.2 Transfer of Sensitive In<strong>for</strong>mationLike any generic data transfer protocol, HTTP cannot regulate thecontent of the data that is transferred, nor is there any a priorimethod of determining the sensitivity of any particular piece ofin<strong>for</strong>mation within the context of any given request. There<strong>for</strong>e,applications SHOULD supply as much control over this in<strong>for</strong>mation aspossible to the provider of that in<strong>for</strong>mation. Four header fields areworth special mention in this context: Server, Via, Referer and From.Revealing the specific software version of the server might allow theserver machine to become more vulnerable to attacks against softwarethat is known to contain security holes. Implementors SHOULD make theServer header field a configurable option.Proxies which serve as a portal through a network firewall SHOULDtake special precautions regarding the transfer of header in<strong>for</strong>mationthat identifies the hosts behind the firewall. In particular, theySHOULD remove, or replace with sanitized versions, any Via fieldsgenerated behind the firewall.The Referer header allows reading patterns to be studied and reverselinks drawn. Although it can be very useful, its power can be abusedif user details are not separated from the in<strong>for</strong>mation contained in<strong>Fielding</strong>, et al. Standards Track [Page 151]RFC <strong>2616</strong> HTTP/1.1 June 1999the Referer. Even when the personal in<strong>for</strong>mation has been removed, theReferer header might indicate a private document's URI whosepublication would be inappropriate.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!