Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replaced 'alias' with 'copy' for less ambiguity #273

Merged
merged 6 commits into from
Dec 1, 2017

Conversation

andypaicu
Copy link
Collaborator

@andypaicu andypaicu commented Nov 28, 2017

@andypaicu andypaicu requested a review from mikewest November 28, 2017 09:39
@andypaicu
Copy link
Collaborator Author

andypaicu commented Nov 28, 2017

@bzbarsky does this solve the ambiguity?

Related issued: #207

Copy link
Member

@mikewest mikewest left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks, Andy!

index.src.html Outdated
@@ -1172,11 +1172,12 @@ <h4 id="initialize-document-csp" algorithm>

1. For each |policy| in |doc|'s <a for="Document">CSP list</a>:

1. Insert an alias to |policy| in |document|'s
1. Insert a copy of |policy| in |document|'s
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: s/ in / into /

Note: <a>local scheme</a> includes `about:`, and this algorithm will
therefore alias the <a>embedding document</a>'s policies for <a>an iframe
therefore copy the <a>embedding document</a>'s policies for <a>an iframe
`srcdoc` `Document`</a>.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should spell this out in a little more detail in a security considerations section. Maybe something like:

As described in [[#link-to-this-section]], documents loaded from [=local schemes=] will be initialized with a copy of their opener's [=CSP list=]. The goal is both to ensure that a page can't bypass its policy by embedding a frame or popping up a new window containing content it entirely controls (srcdoc documents, blob: resources, about:blank that can be poked at via document.write(), etc). For example:

// TODO(andypaicu): Example goes here. ;)

Note that we create a copy of the relevant policies when initializing the new document's [=CSP list=]. This means that the new document's policies are a snapshot of the relevant [=CSP list=] at its creation time. It's possible that more policies could be added to the new document after initialization: these would not be applied to the opener context. Likewise, if more policies are added to the opener context, the new document's [=CSP list=] would be unaffected.

// TODO(andypaicu): Another example!

WDYT?

index.src.html Outdated
@@ -1212,11 +1213,11 @@ <h4 id="initialize-global-object-csp" algorithm>

1. For each |policy| in |owner|'s <a for="global object">CSP list</a>:

1. Insert an alias to |policy| in |global|'s
1. Insert a copy of |policy| in |global|'s
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: s/ in / into /

index.src.html Outdated
@@ -1231,7 +1232,7 @@ <h4 id="initialize-global-object-csp" algorithm>

2. For each |policy| in |owner|'s <a for="global object">CSP list</a>:

1. Insert an alias to |policy| in |global|'s <a for="global object">CSP list</a>.
1. Insert a copy of |policy| in |global|'s <a for="global object">CSP list</a>.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: s/ in / into /

@bzbarsky
Copy link

This looks reasonable, thanks!

@mikewest
Copy link
Member

(Also: I'm assuming you're going to add tests for this when you send me a patch against Chromium? :) )

@andypaicu
Copy link
Collaborator Author

Thank you @mikewest for the review. I've added a new section.
I will be adding tests but I don't think we need to fix anything in Chromium as we already do this.

@mikewest
Copy link
Member

Oh. Even better! Should be trivial to add tests, then. :)

chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Nov 30, 2017
When a new context is opened that inherits the CSP of the parent it
should make a copy of it. If any changes are done to the parent or child
CSP list they should be independant.

Spec change: w3c/webappsec-csp#273

Bug: 789967
Change-Id: I27414e42f02e56d4903cf193192df9fb323093d2
@andypaicu
Copy link
Collaborator Author

web-platform-tests/wpt#8520 I'm also adding a test for this

chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Nov 30, 2017
When a new context is opened that inherits the CSP of the parent it
should make a copy of it. If any changes are done to the parent or child
CSP list they should be independant.

Spec change: w3c/webappsec-csp#273

Bug: 789967
Change-Id: I27414e42f02e56d4903cf193192df9fb323093d2
@andypaicu andypaicu merged commit 2c0f4aa into w3c:master Dec 1, 2017
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Dec 1, 2017
When a new context is opened that inherits the CSP of the parent it
should make a copy of it. If any changes are done to the parent or child
CSP list they should be independant.

Spec change: w3c/webappsec-csp#273

Bug: 789967
Change-Id: I27414e42f02e56d4903cf193192df9fb323093d2
Reviewed-on: https://chromium-review.googlesource.com/800691
Reviewed-by: Mike West <[email protected]>
Commit-Queue: Andy Paicu <[email protected]>
Cr-Commit-Position: refs/heads/master@{#520910}
chromium-wpt-export-bot pushed a commit to web-platform-tests/wpt that referenced this pull request Dec 1, 2017
When a new context is opened that inherits the CSP of the parent it
should make a copy of it. If any changes are done to the parent or child
CSP list they should be independant.

Spec change: w3c/webappsec-csp#273

Bug: 789967
Change-Id: I27414e42f02e56d4903cf193192df9fb323093d2
Reviewed-on: https://chromium-review.googlesource.com/800691
Reviewed-by: Mike West <[email protected]>
Commit-Queue: Andy Paicu <[email protected]>
Cr-Commit-Position: refs/heads/master@{#520910}
MXEBot pushed a commit to mirror/chromium that referenced this pull request Dec 2, 2017
When a new context is opened that inherits the CSP of the parent it
should make a copy of it. If any changes are done to the parent or child
CSP list they should be independant.

Spec change: w3c/webappsec-csp#273

Bug: 789967
Change-Id: I27414e42f02e56d4903cf193192df9fb323093d2
Reviewed-on: https://chromium-review.googlesource.com/800691
Reviewed-by: Mike West <[email protected]>
Commit-Queue: Andy Paicu <[email protected]>
Cr-Commit-Position: refs/heads/master@{#520910}
april added a commit to april/webappsec-csp that referenced this pull request Jan 17, 2018
* 'master' of https://github.com/w3c/webappsec-csp: (209 commits)
  Fix a few typos (w3c#280)
  Introduce 'prefetch-src'. (w3c#283)
  Clarify navigation behavior for 'script-src'.
  Incorrect indentation of the navigation check algorithm.
  IDL amendments and small misc issues. (w3c#271)
  Regenerate HTMLs.
  Origin link.
  NoncedElement link.
  link up inline css issue (w3c#228)
  Replaced 'alias' with 'copy' for less ambiguity (w3c#273)
  Cleanup `global object` usage to make sense with `Documents` (w3c#254)
  Elements with duplicated attributes are not nonceable.
  s/not-example.com/example.org/
  Linked testing policy and fixed a few links (w3c#263)
  Rebuild HTML.
  Fix linking errors to 'script-like' and 'applet'.
  Adds WorkletGlobalScope as a concept to CSP. (w3c#205)
  Slight correction of host matching description (w3c#251)
  Fixed ambigous grammar (w3c#250)
  Replace Request.type based logic with Request.destination (w3c#231)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants