aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorhttp://oneingray.myopenid.com/ <http://oneingray.myopenid.com/@web>2010-03-12 22:12:41 +0000
committerJoey Hess <joey@finch.kitenet.net>2010-03-12 22:12:41 +0000
commitc26b6c3be864aaf49fe0b0fc15c0af59323b7dde (patch)
tree3791dab733062a74ccb26a46d217a8156c697a21
parent29ca20b87c565412fa603127425ccdaf4ca58b79 (diff)
downloadikiwiki-c26b6c3be864aaf49fe0b0fc15c0af59323b7dde.tar
ikiwiki-c26b6c3be864aaf49fe0b0fc15c0af59323b7dde.tar.gz
Note the use of <embed /> on YouTube.
-rw-r--r--doc/todo/finer_control_over___60__object___47____62__s.mdwn15
1 files changed, 14 insertions, 1 deletions
diff --git a/doc/todo/finer_control_over___60__object___47____62__s.mdwn b/doc/todo/finer_control_over___60__object___47____62__s.mdwn
index 0ca949954..50c4d43bf 100644
--- a/doc/todo/finer_control_over___60__object___47____62__s.mdwn
+++ b/doc/todo/finer_control_over___60__object___47____62__s.mdwn
@@ -57,10 +57,23 @@ For Ikiwiki, it may be nice to be able to restrict [URI's][URI] (as required by
>> `usemap`) should make `object` almost as harmless as, say, `img`.
>>> But with local data, one could not embed youtube videos, which surely
->>> is the most obvious use case? Note that youtube embedding uses an
+>>> is the most obvious use case?
+
+>>>> Allowing a &ldquo;remote&rdquo; object to render on one's page is a
+ security issue by itself.
+ Though, of course, having an explicit whitelist of URI's may make
+ this issue more tolerable.
+ &mdash;&nbsp;[[Ivan_Shmakov]], 2010-03-12Z.
+
+>>> Note that youtube embedding uses an
>>> object element with no classid. The swf file is provided via an
>>> enclosed param element. --[[Joey]]
+>>>> I've just checked a random video on YouTube and I see that the
+ `.swf` file is provided via an enclosed `embed` element. Whether
+ to allow those or not is a different issue.
+ &mdash;&nbsp;[[Ivan_Shmakov]], 2010-03-12Z.
+
>> (Though it certainly won't solve the [[SVG_problem|/todo/SVG]] being
>> restricted in such a way.)