-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Anonymous iframes #639
Comments
Hi @camillelamy! Thanks for this review request.
|
Hi @hadleybeeman! I have put together another doc explaining the wider problems we are facing with crossOriginIsolation. To sum it up: developers that currently use SharedArrayBuffers on Chrome need to migrate to crossOriginIsolation or risk losing access to SABs and their websites stop functioning. The migration to crossOriginIsolation is hard, in particular deploying COEP. COEP requires every single embedded frame to have deployed COEP to load or be blocked. This particularly complex when embedding legacy content. This proposal tackles this issue by adding an attribute on iframes that waves the COEP deployment requirement in exchange of additional restrictions on the frame. This way sites that are currently using SABs and have legacy/arbitrary 3rd party content can keep functioning. Real world examples are Google Earth or any site using both SABs and Google Ads for example. We know that there other proposal around iframes going on, Fenced Frames for example. We have been looking at the interaction between Fenced Frames and our proposal, and we'd be happy to discuss our conclusions and look at the interaction with other iframe-related proposals. I have also updated the Security and Privacy questionaire. However, I'd like to point out that many of the questions are yes/no questions, so there often isn't that many more details to give beyond "no the feature is not doing that". |
@atanassov and I looked at this today during our virtual F2F. One thing I'm not terribly enthused about is the name of the DOM attribute or attribute value, because it's not credentials that are being omitted, it's storage, and it's not so much that it's omitted, it's that you get a new, one-off partition. There's an open issue that captures this concern: camillelamy/explainers#20 |
Hi @camillelamy I have similar feedback as i did for #649 which is that the explainer jumps right in to talking about how "sites that wish to continue using SharedArrayBuffer must opt-into cross-origin isolation" without first talking about the end-user use cases (the user need). I see you've responded to Hadley's comment above with a link to the general doc describing the wider problem. But what user need is being served by the use of SharedArrayBuffer in this context that this set of mitigations is aimed at securing? You talk about password managers later on in the explainer doc - is that one of the primary use cases? Can you please amend the explainer to start with a few user needs to help us set the context? |
SharedArrayBuffer availability in the context of an anonymous iframe is not really updated by this proposal. Let me explain why I believe anonymous iframe is useful to developers and end users:
So anonymous iframe is helpful to developers, because they allow the top-level document to deploy crossOriginIsolation and keep embedding their 3rd party iframes. Hoping to have answered the right question. I made a quick online search. Here are some example of users who would see their problems addressed by this proposal:
|
Thanks @ArthurSonzogni that's very helpful. Can this info be brought into the explainer to make that document more clear (including the linked user needs)? This looks good to us on the basis of it being a stopgap. Can you please progress the open issues including the one Tess pointed to. Spec-wise where is this going? Is this headed to HTML? |
Address @torgo suggestion from w3ctag/design-reviews#639 (comment) This adds an example of user's need into the explainer. Along the way, add some minor updates to the explainer.
Address @torgo suggestion from w3ctag/design-reviews#639 (comment) This adds an example of user's need into the explainer. Along the way, add some minor updates to the explainer.
Address @torgo suggestion from w3ctag/design-reviews#639 (comment) This adds an example of user's need into the explainer. Along the way, add some minor updates to the explainer.
@ArthurSonzogni noting the above updates to your explainer. Anything you'd in particular like to draw our attention to? |
I was going to reply in a few days:
Will be done by PR: camillelamy/explainers#25
Tess pointed to camillelamy/explainers#20, which is also addressed by PR camillelamy/explainers#25.
I think HTML & fetch.
|
Thanks @ArthurSonzogni based on this I think we are good to close this. Thanks for being responsive to our feedback! |
Ya ya yawm TAG!
I'm requesting a TAG review of Anonymous iframes.
Anonymous iframes allows to load document that haven't enabled COEP in COEP environments. To make this safe, anonymous iframes restrict usage of shared storage and credentials, to avoid personalized resources being loaded in a high-risk crossOriginIsolated environment.
Further details:
I have reviewed the TAG's Web Platform Design Principles
The group where the incubation/design work on this is being done (or is intended to be done in the future): WHATWG
The group where standardization of this work is intended to be done ("unknown" if not known): WHATWG
Existing major pieces of multi-stakeholder review or discussion of this design:
Major unresolved issues with or opposition to this design:
This work is being funded by: Google
You should also know that...
[please tell us anything you think is relevant to this review]
We'd prefer the TAG provide feedback as (please delete all but the desired option):
🐛 open issues in our GitHub repo for each point of feedback
The text was updated successfully, but these errors were encountered: