Silverlight 4 Security Overview White Paper
[Update: This paper has been updated and published as the Silverlight Security Overview. -Nick]
Wanted to let folks know about a white paper we're making available (attached below). We plan to incorporate this into the main Silverlight documentation by the time we ship the Silverlight 4, but in the meantime I didn't want to keep this content to all ourselves. J We have a fair amount of documentation on Silverlight security already, but there's a couple holes that we hope to address with this paper. The more obvious is that it's, well, an overview -- sometimes you don't need all the gory details, you need a basic lay of the land so you can orient yourself and figure out what details are relevant to you. The second thing we're trying to address is to give an introduction to our security thinking, for example why it's safe for Silverlight to allow sandboxed apps to open files (OpenFileDialog & isolated storage). We don't get into every detail of every security decision we've made, but it will give you a lot of insight into how we choose what to enable in the sandbox.
As usual, we appreciate your feedback, both about Silverlight and about this paper, either via blog comments or by emailing me directly at nkramer@microsoft.com. Thanks.
Update 11/23 -- Thanks for your feedback, I made some edits based on your suggestions:
- reorganized the networking section
- added WebBrowser.NavigateToString() as a way to create XSS holes in Silverlight
- improved wording -- "keep the user safe" -> "help keep the user safe", got rid of the "provably correct" line, etc.
- provided pointer to more info on mark of the web
- fixed a couple typos
- used .doc instead of .docx
Thanks again, I'm looking forward to the next round of feedback!
Silverlight security overview.doc
Comments
Anonymous
November 19, 2009
Thanks very usefull. Is the HTTP Basic authentication implemented on SL 4 ?Anonymous
November 19, 2009
Nick, Could you please attach a doc version of the paper as well. Thank you in advanceAnonymous
November 20, 2009
Hi Same question as above, is basic authentication implemented? NigelAnonymous
November 21, 2009
Hi Nick, I think developers need to learn how to write secure code for SL3 as well. Since you already wrote the article about it on point #3, why not just told us which are also applicable fo SL3. from Walter (DevSec MVP)Anonymous
November 22, 2009
Hi Nick, Will Silverlight ever get real serialization via reflection like full trust WPF apps has? I understand allowing reflection is a security issue but with the new "elevated trust" mode - why not allow it there? We have a very strict domain model today which requires serialization to work with fields only and this has been impossible in both SL and medium trust WPF apps. We want to be able to use our domain model in both the Silverlight app and the WCF server side and we cannot resort to using attributes only like RIA services suggests as this would seriously compromise the domain model of our entire architecture. Thanks, HansAnonymous
November 23, 2009
Hello Nick, The document states that, under elevated trust, sockets are allowed without policy files (great). Is the port restriction gone too ? And is there any listening (tcp) sockets story coming up ? Thanks for sharing! SebastienAnonymous
November 23, 2009
The comment has been removedAnonymous
December 01, 2009
Yea, I second Sebastians request... having as much socket support as possible is critical in my opinion, and the arbitrary restrictions are pretty crampingAnonymous
December 27, 2009
trackback from: http://www.ganshani.com/2009/12/28/silverlight-4-security-overview-white-paper/