Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

A security review; some nits #223

Closed
richsalz opened this issue Nov 15, 2021 · 6 comments · Fixed by #243
Closed

A security review; some nits #223

richsalz opened this issue Nov 15, 2021 · 6 comments · Fixed by #243
Assignees
Labels
editorial security-needs-resolution Issue the security Group has raised and looks for a response on.

Comments

@richsalz
Copy link

@samuelweiler asked me to review the document. I am not an expert in this area. I have a few questions/nits and it seems reasonable to merge them into one issue.

Sec 2.1; why is "SHOULD NOT" not a "MUST NOT" ? What is the use-case for exposing an API that is not supported? Is there some interoperability issue that I don't understand (quite likely).

Sec 2.1.2, I like the highly-detailed processing steps; made it easy to follow.

Sec 3, the note about "fire and forget" should be mentioned in 2.1.2 with a pointer here if needed.

Sec 4. Is there a registry of permission strings (i.e., where "web-share" would appear?) If not, I strongly recommend W3C maintain one.

Sec 6. I could not think of other security concerns, but note again that I am not an expert in this field. The last bullet leads me to think that the share target should fetch the content and use that for any downstream processing rather than handing off URL's. Is that the intent? Is that a best practice? Should that be made more explicit?

@marcoscaceres
Copy link
Member

Sec 2.1; why is "SHOULD NOT" not a "MUST NOT" ? What is the use-case for exposing an API that is not supported? Is there some interoperability issue that I don't understand (quite likely).

I agree. This wording needs to go. No one is exposing .share() without supporting share.

Sec 2.1.2, I like the highly-detailed processing steps; made it easy to follow.

👍

Sec 3, the note about "fire and forget" should be mentioned in 2.1.2 with a pointer here if needed.

Moving the "fire and forget" to 2.1.2. makes sense.

Sec 4. Is there a registry of permission strings (i.e., where "web-share" would appear?) If not, I strongly recommend W3C maintain one.

Good call. It now lives here:
https://w3c.github.io/permissions-registry/#registry-table-of-standardized-permissions

Sec 6. I could not think of other security concerns, but note again that I am not an expert in this field. The last bullet leads me to think that the share target should fetch the content and use that for any downstream processing rather than handing off URL's. Is that the intent? Is that a best practice? Should that be made more explicit?

It's application dependent. I'm of the opinion that the guidance as is clear enough. However, I'd be open to specific suggestions.

@marcoscaceres
Copy link
Member

Hi @richsalz (and @samuelweiler for sec-review tracking purposes), I've sent a pull request addressing your feedback in #243 ... To allow us to close this issue (and per the W3C process for wide review), could you let me know if you are satisfied with this response and the proposed changes in #243?

@ericwilligers
Copy link
Contributor

ericwilligers commented Jun 7, 2022 via email

@richsalz
Copy link
Author

richsalz commented Jun 7, 2022

The PR looks fine to me.

@marcoscaceres
Copy link
Member

Thanks for confirming!

@marcoscaceres
Copy link
Member

marcoscaceres commented Aug 1, 2022

@samuelweiler, given @richsalz approval, could you close the related issue? w3c/security-review#122

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
editorial security-needs-resolution Issue the security Group has raised and looks for a response on.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants