ietf
[Top] [All Lists]

Re: A nuance of interoperability reports

2012-02-22 14:54:09
Murray S. Kucherawy wrote:

From: Richard Barnes [mailto:rbarnes(_at_)bbn(_dot_)com]

Seems like it depends on your definitions of "abusive" and
"legitimate".  Do you have an example?

For a contrived example, let's say a registered HTTP header field
that's only ever found to be present in web pages used by bad actors,
but lots of them.

Such as "P3P:" ?   :-D

-Martin

http://www.h-online.com/security/news/item/Google-also-bypassed-cookie-settings-in-Internet-Explorer-1438781.html
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf