-
-
Notifications
You must be signed in to change notification settings - Fork 677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Site isolation #2409
Comments
It feels very much like a follow-up for issue #1602. We discussed and closed it, #1602 (comment). If you think that provided arguments are not valid and we need to have new requirements, then I would like to see opposite arguments. |
So I've started looking at this topic and I'm currently deep down the XS leaks rabbit hole… 😨 |
I's be interested to see strong arguments for this but I am going to mark it as nonblocker for now |
ping @Sjord |
Would it make sense to include of list of topics not (yet) covered somewhere in the document? "Hey, we didn't say anything on this topic yet so you're on your own for that but that does not mean it's not relevant." |
My personal feeling is that it is not a widespread problem to have a separate solution for that. We can reference to opened or closed issues if it is already discussed somewhere, this is the case also here. |
I pretty much agree with that comment by @ryarmst you linked. That issue was about tabnabbing though, not about site isolation or XS-leaks in general. |
Do you have more precise attack scenario(s) in mind? Then I could validate, is it already covered by requirements or not. Related requirements most likely are located in V50. |
I think if there is a practical attack scenario, it can probably found in the XS leak content that @randomstuff is looking into, but it is indeed a rabbit hole. |
I think the sites I linked do a good job of explaining the attack scenarios:
The first step can often be prevented with same-site cookies. With lax samesite, it is still possible to perform authenticated cross-site GET requests, which is often sufficient to request sensitive information. With strict samesite cookies this is not possible. Also, there can be cases where same-site cookies don't help:
|
I asked:
And I still have the same question - what scenario is not covered by requirement below?
browser exploit I consider to be out of scope for ASVS. |
Sites can set headers to ensure that they never share a browser process with another site. This prevents an attacker from loading sensitive data into memory and then reading it with a side-channel attack or browser exploit.
I propose to add a set of requirements that have the effect of enforcing site isolation, such as requiring Cross-Orgin-Resource-Policy (CORP), Cross-Origin-Opener-Policy (COOP), Cross-Origin-Embedder-Policy (COEP) response headers.
The text was updated successfully, but these errors were encountered: