- From: Matt Menke <notifications@github.com>
- Date: Thu, 27 May 2021 08:27:28 -0700
- To: whatwg/fetch <fetch@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
- Message-ID: <whatwg/fetch/pull/1241/review/670331124@github.com>
@MattMenke2 commented on this pull request. > @@ -7425,32 +7417,6 @@ fetch("https://www.example.com/") </div> -<h3 id=websocket-connections>Connections</h3> - -<p>To <dfn id=concept-websocket-connection-obtain>obtain a WebSocket connection</dfn>, given a -<var>url</var>, run these steps: - -<ol> - <li><p>Let <var ignore>host</var> be <var>url</var>'s <a for=url>host</a>. - - <li><p>Let <var ignore>port</var> be <var>url</var>'s <a for=url>port</a>. - - <li><p>Let <var ignore>secure</var> be false, if <var>url</var>'s <a for=url>scheme</a> is - "<code>http</code>", and true otherwise. - - <li><p>Follow the requirements stated in step 2 to 5, inclusive, of the first set of steps in - <a href=http://tools.ietf.org/html/rfc6455#section-4.1>section 4.1</a> of The WebSocket Protocol > I think the only choice is to make it work per-partition. That's unfortunate if an attacker can manage to use many partitions at the same time, but I think we generally assume that is unlikely. Note that chrome uses top-level-frame schemeful site and innermost iframe schemeful site, so an attacker could, within the context of a frame, open as many iframes as it wants (with different sites it controls) to get as many NIKs as it needs for any putative attack. -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/whatwg/fetch/pull/1241#discussion_r640733675
Received on Thursday, 27 May 2021 15:27:41 UTC