- From: Brad Hill <hillbrad@gmail.com>
- Date: Tue, 07 Jul 2015 00:27:40 +0000
- To: Tanvi Vyas <tanvi@mozilla.com>, Mike West <mkwst@google.com>, "public-webappsec@w3.org" <public-webappsec@w3.org>
- Cc: Dan Veditz <dveditz@mozilla.com>, Wendy Seltzer <wseltzer@w3.org>, Kristijan Burnik <burnik@google.com>, Brian Smith <brian@briansmith.org>, Ryan Sleevi <sleevi@google.com>, Anne van Kesteren <annevk@annevk.nl>, Christoph Kerschbaumer <ckerschbaumer@mozilla.com>
- Message-ID: <CAEeYn8iQKOZVM=jg2bLMxC1CgLeOpAzdsAU+PCd7X=Y69X5N9w@mail.gmail.com>
Sounds good to me, then. Thanks for reading more closely than I! On Mon, Jul 6, 2015 at 2:28 PM Tanvi Vyas <tanvi@mozilla.com> wrote: > Hi Brad, > > > On 7/6/15 1:55 PM, Brad Hill wrote: > > Tanvi, > > 1) upgrade-insecure-requests does not cascade to child browsing contexts > like iframes. So if I want to guarantee that, e.g. an advertisement served > in an iframe could never "break the lock" of the parent page (a common > request from many resource operators) > > upgrade-insecure-requests does cascade per > http://www.w3.org/TR/upgrade-insecure-requests/#nesting. Firefox has > implemented this and it's close to landing. Mike, does Chrome's > implementation enforce upgrades on nested contexts? > > > 2) upgrade-insecure-requests also doesn't mandate that > optionally-blockable mixed content be blocked if an upgrade fails. > > I don't see any language in the spec distinguishing between blockable > and optionally-blockable content. Firefox's implementation treats them > both the same. If the upgrade fails, the resource doesn't load. Mike, can > you comment on Chrome's implementation > > > I think we could make the semantics of upgrade more strict, but they're > really targeting different things. "Upgrade" is really targeted to a > resource I control with "hard-coded" links to other resources I'm pretty > sure are available over https. "Strict" is targeted for making sure that > even 3rd party content I don't control, may not know about in advance, and > which may not have secure equivalents available, can never will make an > http request in the context of my resource or its child contexts. > > Given the above, I think upgrade meets the use case you describe for > strict - it ensures that 3rd party content can never make an http request > in your context. > > > -Brad > > On Mon, Jul 6, 2015 at 12:25 PM Tanvi Vyas <tanvi@mozilla.com> wrote: > >> Hi Mike, >> >> I still have concerns about Strict Mixed Content Checking[1] and >> upgrade-insecure-requests[2] as discussed here: >> >> https://groups.google.com/a/chromium.org/d/msg/blink-dev/MafYMJ3zQw0/hnVVOM4drh4J >> >> I don't see why any website would choose Strict Mixed Content Checking >> (where content is blocked with no fallback) over upgrade-insecure-requests >> (where the browser tries the https version and only blocks if it doesn't >> exist). The website will function better in the latter case. In both >> cases, there is no Mixed Content Blocker UI in the browser chrome. If the >> website wants reports on when an upgrade might happen, it can use csp in >> report-only-mode. >> >> When Strict Mixed Content Checking was written, upgrade-insecure-requests >> didn't exist. Now that it does, we should consider removing Strict Mixed >> Content Checking from the spec. Are there use cases for strict that >> upgrade doesn't cover? >> >> Thanks! >> >> ~Tanvi >> >> [1] http://www.w3.org/TR/mixed-content/#strict-checking >> [2] http://www.w3.org/TR/upgrade-insecure-requests/ >> >> On 6/22/15 7:17 AM, Mike West wrote: >> >> Hello, webappsecians! >> >> Mixed Content (http://www.w3.org/TR/mixed-content/) has been up as a >> candidate recommendation since March 17th. The final patent exclusion >> period expired on May 17th ( >> https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0178.html). >> In the CR, we suggested that a transition to proposed recommendation could >> be possible after a comment period extending through July 1st. As that date >> is rapidly approaching, this is a Call for Consensus to transition to >> Proposed Recommendation based on the version of the document at: >> >> >> https://w3c.github.io/webappsec/specs/mixedcontent/published/2015-07-PR.html >> >> This document is substantively the same as the CR, with the following >> normative changes: >> >> 1. I've dropped the "at risk" note for "deprecated TLS-protection": >> https://github.com/w3c/webappsec/commit/5dd23ba69ecd39a45eceff86533dfb91f0ab645c >> (CCing Brian, who I believe was interested in the opposite, and Ryan, who >> might or might not have implemented the SHA-1 bits for Chrome). >> >> 2. The CA/B forum's "baseline requirements" were inadvertently listed >> as a normative reference. The new draft correctly lists them as >> informative: >> https://github.com/w3c/webappsec/commit/90067b887e16d259dc01f712c7a48a0ab6e3f583 >> . >> >> A full list of changes can be found at >> https://github.com/w3c/webappsec/commits/master/specs/mixedcontent/index.src.html >> (and they're almost all in response to =JeffH's comments at >> https://lists.w3.org/Archives/Public/public-webappsec/2015Mar/0107.html). >> >> Kristijan is putting the finishing touches on an extensive test suite >> at https://github.com/w3c/web-platform-tests/pull/1889, and we expect it >> to land in the near future. Interested folks are encouraged to play around >> with the suite now. We expect substantial agreement on behavior across >> Chrome, Firefox, Internet Explorer/Edge, and (hooray!) the beta release of >> Safari on iOS9 and El Cap. >> >> If you have any comments or concerns regarding this CfC, please reply >> to public-webappsec@w3.org by the end of June 6th at the latest. Silence >> will be interpreted as glowing praise and full-throated agreement, but I'd >> encourage you to praise full-throatedly, glowingly, _and_ explicitly on the >> list. :) >> >> Thanks! >> >> -- >> Mike West <mkwst@google.com>, @mikewest >> >> Google Germany GmbH, Dienerstrasse 12, 80331 München, >> Germany, Registergericht und -nummer: Hamburg, HRB 86891, Sitz der >> Gesellschaft: Hamburg, Geschäftsführer: Graham Law, Christine Elizabeth >> Flores >> (Sorry; I'm legally required to add this exciting detail to emails. Bleh.) >> >> >> >
Received on Tuesday, 7 July 2015 00:28:21 UTC