-
Notifications
You must be signed in to change notification settings - Fork 2
Isolation part is vague #3
Comments
You're correct that there are still risks to being opened by someone else, but I think COOP would turn them into one-shot fire-and-forget attacks, as opposed to persistent mechanisms of retrying, which should hinder timing attacks' success rates.
I'm most concerned at the moment with side-channel attacks enabled by pulling cross-origin resources into an attacker's process, which is why the I'd appreciate thoughts about how we can frame the threat model in order to make that more clear on the one hand, and how we might extend it to include threats I'm not currently considering on the other. |
I'm not familiar with COEP, but would
This part is clear, and I think this is a great step :)
I think what clear to me is the threat you are trying to protect against Speculative execution side-channel attacks. But how much we want to protect against XS-Leaks and stuff is unclear :) If |
It would require cross-origin frames to opt-into being embedded, by setting a That's obviously not complete protection, as opting-into being embeddable makes it possible to poke at you via the frame relationship (and COOP doesn't do anything in particular to break that relationship, unfortunately). But I think it still has substantial impact, as many exciting sites are unlikely to explicitly opt-into being embeddable. |
IIUC, sending
If cross-site frames can be embedded, then I'm not sure how you are going to maintain the Isolation.
|
Yes. The frame can opt-in to being embedded. As I said above, it still has substantial impact, as many exciting sites are unlikely to explicitly opt-into being embeddable.
I look forward to tightening TL;DR: Ship "good", don't wait for "perfect". :) |
Got it, just wanted to make sure I understand this correctly :) It's definitely a great step forward :) |
Closing this out, as |
First of all, thanks @mikewest for making a great draft👏 I'm really happy to see this change 🙂
I have question in following part.
I don't understand really well about attack you are trying to prevent by restricting
postMessage()
.If it's a fear that
postMessage()
could trigger XSS bug across origin, then there arewindow.name
andPortalActivateEvent
. If it's a fear against possible side channel, then there's ScrollToTextFragment + IntersectionObserver.It'd be great if you can explain more in detail about what you want to solve with Isolation.
The text was updated successfully, but these errors were encountered: