Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vendors Signal Feedback Cycle 1 #22

Merged
merged 22 commits into from
Sep 12, 2024
Merged

Vendors Signal Feedback Cycle 1 #22

merged 22 commits into from
Sep 12, 2024

Conversation

@weizman weizman changed the title Reorder Vendors Signal Feedback Cycle 1 Sep 10, 2024
@weizman
Copy link
Collaborator Author

weizman commented Sep 10, 2024

Progress

README.md Outdated Show resolved Hide resolved

### Privacy

This feature doesn't provide any information about the user, and hence doesn't have privacy aspects to consider.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This feature doesn't provide any information about the user, and hence doesn't have privacy aspects to consider.
This feature doesn't provide any information about the user, and hence doesn't have privacy aspects to consider.
It is limited to Same Origin Realms therefore offers no new ways to track the user.

README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated
In that context, it might be worth reflecting possible alternatives and their pros and cons:

1. CSP (via header) - introduce `init-realm` via a CSP header (current proposal's state)
* PRO - a capability preserved to the web app (which is the entity expected to be capable of controling such power)
Copy link

@naugtur naugtur Sep 12, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* PRO - a capability preserved to the web app (which is the entity expected to be capable of controling such power)
* PRO - a capability reserved to the web app (which is the entity expected to be capable of controlling such power)

README.md Outdated
* PRO - a capability preserved to the web app (which is the entity expected to be capable of controling such power)
* CON - if the web app mistakenly allows other entities to control headers, this feature can allow them to introduce XSS (unprecedented)
2. CSP (via meta) - introduce `init-realm` via a meta tag
* PRO - Better than a header in the sense that transitioning from a headers' setting capability to XSS is unprecedented and quite an escalation, but if attackers need to be able to modify the initial HTML of the app to transition to XSS, that is (1) more unlikely and (2) less of an escalation (if they can inject HTML tags, they might as well inject a script or an iframe).
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* PRO - Better than a header in the sense that transitioning from a headers' setting capability to XSS is unprecedented and quite an escalation, but if attackers need to be able to modify the initial HTML of the app to transition to XSS, that is (1) more unlikely and (2) less of an escalation (if they can inject HTML tags, they might as well inject a script or an iframe).
* PRO - Better than a header in the sense that escalating from controlling headers to XSS is unprecedented, but if attackers need to be able to modify the initial HTML of the app to transition to XSS, that is (1) more unlikely and (2) less of an escalation (if they can inject HTML tags, they might as well inject a script or an iframe).

@weizman weizman merged commit 3f15252 into main Sep 12, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants