-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSP: Consider allowing frame-ancestors
to work for subresource loads.
#17
Comments
From @annevk on August 22, 2015 7:30 How does this make sense for CSP though? This seems a lot like http://www.w3.org/TR/from-origin/. |
From @briansmith on August 22, 2015 16:2 How does it not make sense for CSP, given that CSP already does it for iframes? It wouldn't make sense to do it separately now. I agree that this looks a lot like from-origin, and part of the motivation looks similar to what you described in [1]. Referrer policy makes this more of an acute issue, because Referer header checks will work less and less well. |
From @annevk on August 24, 2015 11:53 Well an |
From @hillbrad on August 24, 2015 16:23 I'll give the same caution here that I did for from-origin, which is that I I don't think "defending against hotlinking" is a valid goal for CSP. (if |
This isn't a priority of constituencies issues. Users create content as well as consume content.
If users have to pay for hosting their content, then anti-leaching absolutely does help them. But, is this really just about anti-leaching? Doesn't this have positive benefits as far as CSRF is concerned? I can't remember, but I think that CSRF issues are the reason that Mike and I were discussing this in the first place--probably after me mentioning how terrible EPR is. |
Oh, yes, this is also an enabler/accelerant for improved Referer policy, including no-Referer-by-default, because it covers one of the non-privacy-invasive use cases of the Referer header. Also, insofar as priority of constituencies is concerned, frame-ancestors already has the same issue with iframes. |
Does anyone feel strongly enough about this to make a more concrete proposal? |
From @mikewest on August 22, 2015 0:1
After a quick chat with @briansmith, I think I'm convinced that it would be worth giving subresource fetches the capability of canceling themselves based on the resources that requested them. That is,
frame-ancestors
(orembedder-src
, or however we'd like to spell it) would work on<img>
in the same way it works on<iframe>
. This could shut down a class of information leakage attacks (e.g. Facebook might want to say that an image on their CDN can only be loaded in the context offacebook.com
, but not inawesome-facebook-images.info
), could make it moderately more difficult to detect whether a user is logged in (aslogged-in-logo.png
won't load onevil.com
for anyone, logged-in or not), and could help defend against hotlinking.Worth considering.
Copied from original issue: w3c/webappsec#458
The text was updated successfully, but these errors were encountered: