Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

HTTP header fields #249

Open
martinthomson opened this issue Nov 19, 2018 · 2 comments
Open

HTTP header fields #249

martinthomson opened this issue Nov 19, 2018 · 2 comments
Labels
feature question Questions and issues around specific policy-controlled features

Comments

@martinthomson
Copy link
Member

Mozilla reviewed this internally and concluded that the HTTP header fields aren't valuable.

This assumes that feature policy has a narrower purpose than described, which is to manage the delegation of permissions. We think that any application of feature policy to security is a poor fit in light of the window.open() escape.

@clelland
Copy link
Collaborator

I've updated the issue about the window.open() problem in #173 (new PR in #259)

@clelland
Copy link
Collaborator

clelland commented Dec 4, 2018

There are at least three cases that I know of where the header field is useful or necessary -- I just want to make sure that Mozilla has considered all of them.

  1. For the 'undesirable behaviour / features' use case in Define the scope of feature policy #252 -- that covers features which a site would most likely be interested in disabling for themselves, which can't be done for top-level documents which aren't being framed by another containing document. (I understand that Mozilla does not necessarily support this use case at all, but I'm listing it for completeness)

  2. To sandbox or restrict permissions at the top-level -- Iframe sandboxing can be self-applied through headers, via Content-Security-Policy. This is useful for pages where the operator of the web server really doesn't trust the content, and could be used by Feature Policy for finer-grained control than sandboxing.

  3. To support policies in workers -- I'm working on adding support for FP in worker contexts, and those (especially service workers) can't really be considered subresources of the pages which create them. In order to avoid races, it makes sense for workers to define their own policies, through an HTTP-level mechanism. (This is immediately useful for the 'usb' feature, and will be needed for Client Hints (Feature Proposal: Client Hints delegation #129) as well.)

@pabrai pabrai added the feature question Questions and issues around specific policy-controlled features label May 8, 2019
@pabrai pabrai added this to New input in FP Engagement May 13, 2019
@pabrai pabrai moved this from New input to Questions in FP Engagement May 13, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature question Questions and issues around specific policy-controlled features
Projects
FP Engagement
Questions
Development

No branches or pull requests

3 participants