Skip to content

Commit

Permalink
MIX: 'data:' and 'javascript:' are not authenticated origins.
Browse files Browse the repository at this point in the history
  • Loading branch information
mikewest committed Sep 3, 2014
1 parent cce64da commit c17d4f4
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 16 deletions.
14 changes: 4 additions & 10 deletions specs/mixedcontent/index.html
Expand Up @@ -1100,14 +1100,11 @@ <h3 class="heading settled" data-level=5.4 id=is-origin-authenticated><span clas
</li>
</ol>

<p class=issue id=issue-12ee7138><a class=self-link href=#issue-12ee7138></a>What should we do with <code>data:</code>? It seems that we would
need to define some sort of taint checking in order to determine whether
they were created from authenticated resources, which seems error prone.
Perhaps excluding them is really the right thing to do.</p>

<p class=note>Note: The origin of <code>blob:</code> and <code>filesystem:</code> URLs
is the origin of the context in which they were created. Therefore, blobs
created in an authenticated origin will themselves be authenticated.</p>
created in an authenticated origin will themselves be authenticated. The
origin of <code>data:</code> and <code>javascript:</code> URLs is an
opaque identifier, which will not be considered authenticated.</p>

<p class=note>Note: Step #5 above is meant to cover vendor-specific URL schemes whose
contents are authenticated by the user agent. For example, FirefoxOS
Expand Down Expand Up @@ -1432,7 +1429,4 @@ <h2 class="no-num heading settled" id=issues-index><span class=content>Issues In
integration with Fetch isn’t fully specified. It’s also not really
clear what "insecure" should mean in a ServiceWorker context. We
accept <code>blob</code> resources, for instance: should we accept
responses synthesized by the service worker?<a href=#issue-7701a1bf></a></div><div class=issue>What should we do with <code>data:</code>? It seems that we would
need to define some sort of taint checking in order to determine whether
they were created from authenticated resources, which seems error prone.
Perhaps excluding them is really the right thing to do.<a href=#issue-12ee7138></a></div></div>
responses synthesized by the service worker?<a href=#issue-7701a1bf></a></div></div>
9 changes: 3 additions & 6 deletions specs/mixedcontent/index.src.html
Expand Up @@ -968,14 +968,11 @@ <h3 id="is-origin-authenticated">
</li>
</ol>

ISSUE: What should we do with <code>data:</code>? It seems that we would
need to define some sort of taint checking in order to determine whether
they were created from authenticated resources, which seems error prone.
Perhaps excluding them is really the right thing to do.

Note: The origin of <code>blob:</code> and <code>filesystem:</code> URLs
is the origin of the context in which they were created. Therefore, blobs
created in an authenticated origin will themselves be authenticated.
created in an authenticated origin will themselves be authenticated. The
origin of <code>data:</code> and <code>javascript:</code> URLs is an
opaque identifier, which will not be considered authenticated.

Note: Step #5 above is meant to cover vendor-specific URL schemes whose
contents are authenticated by the user agent. For example, FirefoxOS
Expand Down

0 comments on commit c17d4f4

Please sign in to comment.