CARVIEW |
Select Language
HTTP/2 200
date: Fri, 10 Oct 2025 11:06:52 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
x-robots-tag: none
etag: W/"a281a4fd1c3b05d3f3b1434aa5f51fa5"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com github.githubassets.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com wss://alive-staging.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com marketplace-screenshots.githubusercontent.com/ copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=JO%2B629sOfi0zGBeBFs9984mjZZXlnQcm8RcpVqKiVhauobUB9bz92AsgJzsW08e%2BMpfQgbmiiyW1mqg6HxErDsMgy6gXfDh7%2F4ZLfO7kC%2FwoK%2FALVVekMC%2FIcQCBnZjRGgokmY%2FCpekvBd7VIuuekYkKMfGERutUY9dm2Ktv3is%2FpeKxeMbUO%2Byf24U%2B7WHWq6KdFf7Bt%2B6u7DqamafYVdoouFW2miRZwhz5zlw2%2BYRlT17GSLVewXKNhnWQUKs3nwRxcIpDmjqecpMTOR0GAA%3D%3D--KDNk9%2B2GPGgZjeRR--3sd1MJN%2FqJHpnbbblUl4Yg%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.1796548515.1760094411; Path=/; Domain=github.com; Expires=Sat, 10 Oct 2026 11:06:51 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Sat, 10 Oct 2026 11:06:51 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: 952A:2AA7F:189D7BA:1D5B053:68E8E8CB
Risk of trusting subdomains · RequestPolicyContinued/requestpolicy Wiki · GitHub
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 35
Risk of trusting subdomains
nodiscc edited this page Apr 26, 2015
·
1 revision
Note: This does not apply if you untick Allow requests to the same domain
in Preferences > Manage policies > Default Policy
- Subdomains are generally assumed to be owned by the same organization as the main domain. (eg.
images.example.com
is assumed to belong to the same organization aswww.example.com
). The general risk is that it is possible for a site to direct traffic for a subdomain of theirs to a different company's IP address. This situation appears to be fairly uncommon at the current time, but is a real threat to privacy and is currently in use on various popular sites. The owner ofexample.com
could pointcdn.example.com
to a content distribution network used onexample.com
, but that is actually owned by an other company (content delivery netowrks, analytics and tracking services...), or to direct traffic forads.example.com
to an other company that serves ads. - If you host
personal.example.com
on your local network, an attacker who controlsanother.example.com
will be able to bypass RequestPolicy's default deny policy forpersonal.example.com
, as it does not apply to requests to the same domain. - An attacker that tricks you into visiting
www.evilsite.com
could point his subdomainattack.evilsite.com
to the IP address ofyour-bank.com
, thus the requests to the bank site will be allowed. However, your browser will not send cookies saved foryour-bank.com
to the attacker, as they do not have the same domain name. This makes the attack less useful in most situations.
- Home
- About
- Help & Support
-
Documentation
- Quick Start
- FAQ
- benefits of using RP
- miscellaneous
- Contributing
- Development
Clone this wiki locally
You can’t perform that action at this time.