- From: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
- Date: Sun, 7 Apr 2019 20:10:00 +0300 (EEST)
- To: HTTP Working Group <ietf-http-wg@w3.org>, Mike West <mkwst@google.com>
- CC: Kari Hurtta <hurtta-ietf@elmme-mailer.org>
Follow-up:
Delivery scope "same-site" should be same definition
on "same-siteness" than
5.2. "Same-site" and "cross-site" Requests
https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-02#section-5.2
gives. But now it is not. It is confusing when two releted technology
uses different definition.
( SameSite is already implemented by browsers )
( continuing inline )
> 3.2. Requests and Responses
> https://tools.ietf.org/html/draft-west-http-state-tokens-00#section-3.2
>
> | This document relies upon the definitions of "request" and "response"
> | found in [Fetch].
> |
> | A request's delivery scope can be obtained as follows:
> |
> | 1. Let "request-origin" be the request's "origin", and "target-
> | origin" be the request's "URL"'s "origin".
> |
> | 2. If the request was generated by the user agent as a response to
> | direct user interaction with the user agent (e.g. the user typed
> | an address into the agent's address bar, clicked a bookmark, or
> | etc.), return "same-origin".
> |
> | 3. If "request-origin" is same-origin with "target-origin", return
> | "same-origin".
> |
> | 4. If "request-origin"'s registrable domain is the same as "target-
> | origin"'s registrable domain, return "same-site".
I think that should be named "same-domain" so that it does not
confuse "same-site" request definition for SameSite cookies
(it uses "site for cookies").
Use "same-site" term for request's delivery scope only
if client's "site for cookies" (as defined for SameSite)
is the same as "target-origin"'s registrable domain.
> | 5. Return "cross-site".
>
>
> Is delivery=same-site intended to cause Sec-Http-State request field
> to be send about same requests than Cookies with SameSite attribute?
>
> SameSite seems use definition "site for cookies" for that. How that
> compare to "request-origin" ?
"site for cookies" is different than "request-origin"
That is effectively
https://html.spec.whatwg.org/multipage/origin.html#origin
| If the Document's URL's scheme is a network scheme
|
| A copy of the Document's URL's origin assigned when the Document is created.
|
| The document.open() method can change the Document's URL to "about:blank". Therefore the origin is assigned when the Document is created.
> 5.2. "Same-site" and "cross-site" Requests
> https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-02#section-5.2
>
> | 2. Let "site" be "request"'s client's "site for cookies" (as defined
> | in the following sections).
> |
> | 3. Let "target" be the registered domain of "request"'s current url.
> |
> | 4. If "site" is an exact match for "target", return "same-site".
>
> 5.2.1. Document-based requests
> https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-02#section-5.2.1
>
> | For a document displayed in a top-level browsing context, we can stop
> | here: the document's "site for cookies" is the top-level site.
>
> (and so on)
https://tools.ietf.org/html/draft-ietf-httpbis-rfc6265bis-02#section-5.2.1
specially:
| 5.2.1. Document-based requests
|
| The URI displayed in a user agent's address bar is the only security
| context directly exposed to users, and therefore the only signal
| users can reasonably rely upon to determine whether or not they trust
| a particular website. The registered domain of that URI's origin
| represents the context in which a user most likely believes
| themselves to be interacting. We'll label this domain the "top-level
| site".
|
| For a document displayed in a top-level browsing context, we can stop
| here: the document's "site for cookies" is the top-level site.
|
| For documents which are displayed in nested browsing contexts, we
| need to audit the origins of each of a document's ancestor browsing
| contexts' active documents in order to account for the "multiple-
| nested scenarios" described in Section 4 of [RFC7034]. These
| document's "site for cookies" is the top-level site if and only if
| the document and each of its ancestor documents' origins have the
| same registered domain as the top-level site. Otherwise its "site
| for cookies" is the empty string.
>
> I failed interpret how Fetch defines request's "origin"
>
> https://fetch.spec.whatwg.org/#concept-request-origin
>
> https://html.spec.whatwg.org/multipage/origin.html#concept-origin
>
>
> Specially nested browsing contexts (iframes and so on).
/ Kari Hurtta
Received on Sunday, 7 April 2019 17:10:32 UTC