-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Relax mixed-content for private -> private
, private -> local
and local -> private
#109
Comments
They should work just like public to public requests. |
But this is creating a weird situation! Assuming I want to access Then - with this new mechanism - I will be able to access the above (private network) URL from a public site like So we'll be forced to serve via http instead, which wouldn't have been a problem in earlier times, but as you are cutting off all new features from http, It can't be that a publicly served site has more access privileges in my local network than something I'm serving in my local network only...?! |
Can you please re-open? |
I don't understand. Why can't you access the above URL from |
I see your point. Indeed, mixed content would block those requests. It is a little weird that public websites can get around mixed content but private and local can't. |
private -> private
and local -> anything
?private -> private
and local -> anything
Thanks for re-opening! With all the cloud-centric hype these days, it should not be forgotten that the most secure systems are those where no public network communication is happening or required at all, and such solutions must not be disregarded. |
Thanks for the feedback! It seems to me we can just remove the assertions that the target IP address space is less public than the client's, both in the spec and in Chromium. Then |
private -> private
and local -> anything
private -> private
and local -> private
Sounds good. I've changed the title accordingly. How about |
https://wicg.github.io/private-network-access/#non-public-ip-address-blocks listed IP address ranges that are considered local. |
Yes, I've read that. But will it work? Assuming the web site is served from the local network - let's say So in the browser, I'm opening |
According to step 4 of https://w3c.github.io/webappsec-secure-contexts/#is-origin-trustworthy, the first 3 are trustworthy and shouldn't be blocked as mixed content as Chrome is today. The 4th and 5th shall be relaxed once Chrome implements what @letitz mentioned in #109 (comment) |
private -> private
and local -> private
private -> private
, private -> local
and local -> private
Excellent! I've updated the title. Thanks |
I am new. Can anyone help me as far as what to do from the initial start? |
@CSiggers77 What do you hope to achieve? |
I received a notice from the origin trial asking for feedback, and I would like to see the questions and concerns that @softworkz has raised be addressed. Thanks. |
The explainer states:
How is that supposed to work then? Is there a different mechanism?
Thanks
The text was updated successfully, but these errors were encountered: