<html xmlns="http://www.w3.org/1999/xhtml"><head></head><body><section><h1>仕様書</h1><refs xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:"><ul xmlns="http://www.w3.org/1999/xhtml"><li><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="12" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[12]</anchor-end> <cite xml:lang="en">Private Network Access</cite>, <time>2022-01-03T09:31:39.000Z</time>, <time>2022-01-12T08:25:12.195Z</time> <anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://wicg.github.io/private-network-access/">https://wicg.github.io/private-network-access/</anchor-external></li></ul></refs></section><section><h1>歴史</h1><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="1" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[1]</anchor-end> <cite>MIX: Block private resources from public resources. · d635094 · w3c/webappsec</cite>
( (<time>2014-06-06 11:39:18 +09:00</time> 版))
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://github.com/w3c/webappsec/commit/d635094f4e6f6a27fd565f63c9570858de27172b">https://github.com/w3c/webappsec/commit/d635094f4e6f6a27fd565f63c9570858de27172b</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="2" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[2]</anchor-end> <cite>Issue 378566 - chromium - Block sub-resource loads from the web to private networks and localhost - An open-source project to help move the web forward. - Google Project Hosting</cite>
(<time>2015-03-20 11:44:21 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://code.google.com/p/chromium/issues/detail?id=378566">https://code.google.com/p/chromium/issues/detail?id=378566</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="3" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[3]</anchor-end> <cite xml:lang="en">CORS and RFC1918</cite>
(<time>2016-01-04 22:56:10 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://mikewest.github.io/cors-rfc1918/">https://mikewest.github.io/cors-rfc1918/</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="4" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[4]</anchor-end> <cite xml:lang="en">Limiting requests from the internet to the intranet.</cite>
(<anchor xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:">Mike West</anchor> 著, <time>2016-01-04 22:10:49 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0000.html">https://lists.w3.org/Archives/Public/public-webappsec/2016Jan/0000.html</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="5" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[5]</anchor-end> <cite>Issue 378566 - chromium - Block sub-resource loads from the web to private networks and localhost - An open-source project to help move the web forward. - Google Project Hosting</cite>
(<time>2016-01-05 11:03:34 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://code.google.com/p/chromium/issues/detail?id=378566">https://code.google.com/p/chromium/issues/detail?id=378566</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="6" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[6]</anchor-end> <cite>Issue 693 - google-security-research - TrendMicro node.js HTTP server listening on localhost can execute commands - Google Security Research - Google Project Hosting</cite>
(<time>2016-01-14 15:18:11 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://code.google.com/p/google-security-research/issues/detail?id=693">https://code.google.com/p/google-security-research/issues/detail?id=693</anchor-external></p><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="7" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[7]</anchor-end> <cite xml:lang="en"><strong></strong>[<strong></strong>MIX<strong></strong>]<strong></strong> Carveout for `127.0.0.1`?</cite>
(<anchor xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:">Mike West</anchor> 著, <time>2016-04-29 16:43:49 +09:00</time> 版)
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://lists.w3.org/Archives/Public/public-webappsec/2016Apr/0044.html">https://lists.w3.org/Archives/Public/public-webappsec/2016Apr/0044.html</anchor-external></p><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="8" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[8]</anchor-end> <cite xml:lang="en-US">Same site scripting - Vulnerabilities - Acunetix</cite>
( (<time>2016-05-04 12:33:33 +09:00</time>))
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://www.acunetix.com/vulnerabilities/web/same-site-scripting">https://www.acunetix.com/vulnerabilities/web/same-site-scripting</anchor-external></figcaption><blockquote><p>Tavis Ormandy reported a common DNS misconfiguration that can result in a minor security issue with web applications. </p><p>&quot;It's a common and sensible practice to install records of the form &quot;localhost. IN A 127.0.0.1&quot; into nameserver configurations, bizarrely however, administrators often mistakenly drop the trailing dot, introducing an interesting variation of Cross-Site Scripting (XSS) I call Same-Site Scripting. The missing dot indicates that the record is not fully qualified, and thus queries of the form &quot;localhost.example.com&quot; are resolved. While superficially this may appear to be harmless, it does in fact allow an attacker to cheat the RFC2109 (HTTP State Management Mechanism) same origin restrictions, and therefore hijack state management data.&quot;</p></blockquote></figure><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="9" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[9]</anchor-end> <cite>network - What is same site scripting and what are some exploit scenarios? - Information Security Stack Exchange</cite>
( (<time>2016-05-04 12:33:41 +09:00</time>))
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://security.stackexchange.com/questions/71843/what-is-same-site-scripting-and-what-are-some-exploit-scenarios">http://security.stackexchange.com/questions/71843/what-is-same-site-scripting-and-what-are-some-exploit-scenarios</anchor-external></figcaption><blockquote><p>Like many names in the security field, this is a bit of a misnomer. It's not really the same site that's performing the xss attack. It's the same domain, but the site happens to be the local machine, not the website in question. This is also not an xss/JavaScript injection issue, but a DNS misconfiguration that bypasses the same domain policy and allows non-injected JavaScript from the local host to run in the context of pages served by the misconfigured domain.</p><p>It would have been more accurate to name it something like 'Same-Domain Policy Bypass via DNS Misconfiguration', but that's not nearly as sexy.</p></blockquote></figure><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="10" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[10]</anchor-end> <cite xml:lang="en">Dnsmap v0.30 is now out!</cite>
( (<time>2016-05-04 12:35:53 +09:00</time>))
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://www.gnucitizen.org/blog/dnsmap-v030-is-now-out/">http://www.gnucitizen.org/blog/dnsmap-v030-is-now-out/</anchor-external></figcaption><blockquote><p>* Disclosure of internal IP addresses (RFC 1918) are reported</p><p>* Domains susceptible to <strong>[</strong>same site scripting<strong>]</strong>(http://snipurl.com/etbcv) are reported</p></blockquote></figure><figure class="quote"><figcaption><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="11" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[11]</anchor-end> <cite>Bugtraq: common dns misconfiguration can lead to &quot;same site&quot; scripting</cite>
( (<anchor xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:">Tavis Ormandy</anchor>著, <time>2016-03-12 09:51:36 +09:00</time>))
<anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="http://seclists.org/bugtraq/2008/Jan/270">http://seclists.org/bugtraq/2008/Jan/270</anchor-external></figcaption><blockquote><p>Initial analysis shows that some of the worlds most popular websites are</p><p>affected. The administrators of the example domains listed below were</p><p>sent a draft of this email 7 days before release, so some (or all) may</p><p>have been corrected, these examples are simply intended to demonstrate</p><p>how widespread this problem is. </p><p>localhost.microsoft.com has address 127.0.0.1</p><p>localhost.ebay.com has address 127.0.0.1</p><p>localhost.yahoo.com has address 127.0.0.1</p><p>localhost.fbi.gov has address 127.0.0.1</p><p>localhost.citibank.com has address 127.0.0.1</p><p>localhost.cisco.com has address 127.0.0.1</p><p>etc.</p></blockquote></figure><p><anchor-end xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:anchor="13" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:">[13]</anchor-end> <cite xml:lang="en">GitHub - WICG/private-network-access</cite>, <time>2022-01-12T08:25:37.000Z</time> <anchor-external xmlns="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resScheme="URI" xmlns:a0="urn:x-suika-fam-cx:markup:suikawiki:0:9:" a0:resParameter="https://github.com/WICG/private-network-access">https://github.com/WICG/private-network-access</anchor-external></p></section></body></html>