Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal: Storage Access API #560

Closed
johnwilander opened this issue Jan 9, 2018 · 6 comments
Closed

Proposal: Storage Access API #560

johnwilander opened this issue Jan 9, 2018 · 6 comments

Comments

@johnwilander
Copy link

Hi! John Wilander from WebKit here. We hope this can extend existing specifications rather than some whole new spec.

Storage Access API

Problem

Tl;dr: Browsers that block access to third-party cookies break authenticated embeds such as commenting widgets and subscribed video services.

In the context of cross-origin resource loads, cookies are popularly referred to as third-party cookies. In reality, these cookies are often the same as the first-party cookies so what we really mean with third-party cookies is access to first-party cookies in a third-party context.

A browser may have rules for third-party cookies that go beyond cookie policy rules such as scheme, host, path, secure attribute etc. These additional rules may be:

  • Third-parties aren't allowed to set cookies,
  • Third-parties have their cookies partitioned or double-keyed, or
  • Third-parties have no cookie access.

However, certain services are intended to be embedded as third-party content and need access to first-party cookies for authentication. Examples are commenting widgets, video embeds, document embeds, and social media action widgets. These break if the third-party content has no access to its first-party cookies.

The same problem exists for other kinds of storage such as IndexedDB and LocalStorage, except they are not tied to the HTTP protocol and are typically not used for authentication purposes. From here on we will refer to cookies except when the distinction between cookies and other storage makes sense.

Proposed Solution

Tl;dr: A new API with which cross-origin iframes can request access to their first-party cookies when processing a user gesture such as a tap or a click. This allows third-party embeds to authenticate on user interaction.

We propose two new functions on the document:

partial interface Document {
    Promise<bool> hasStorageAccess();
    Promise<void> requestStorageAccess();
};

hasStorageAccess() can be called at any time to check whether access is already granted and it doesn't require user interaction.

requestStorageAccess() should only be called on user interaction such as a tap or a click. It will check a set of rules and grant access if the rules are fulfilled. Access to first-party cookies in the given iframe can be assumed if the returned promise resolves. From that point, any sub resource load in the iframe will have first-party cookies sent and incoming cookies will be set in the first-party cookie jar.

Note that no other third-party resources on that webpage are affected by the storage access status of an individual iframe.

Algorithm for requestStorageAccess()

  1. If the document already has been granted access, resolve.
  2. If the document has a null origin, reject.
  3. If the document's frame is the main frame, resolve.
  4. If the sub frame's origin is equal to the main frame's, resolve.
  5. If the sub frame is not sandboxed, skip to step 7.
  6. If the sub frame doesn't have the token "allow-storage-access-by-user-activation", reject.
  7. If the sub frame's parent frame is not the top frame, reject.
  8. If the browser is not processing a user gesture, reject.
  9. Check any additional rules that the browser has. Examples: Whitelists, blacklists, on-device classification, user settings, anti-clickjacking heuristics, or prompting the user for explicit permission. Reject if some rule is not fulfilled.
  10. Grant the document access to cookies and store that fact for the purposes of future calls to hasStorageAccess() and requestStorageAccess().

Access Removal

Storage access is granted for the life of the document and as long as the document's frame is attached to the DOM. This means:

  • Access is removed when the sub frame navigates.
  • Access is removed when the sub frame is detached from the DOM.
  • Access is removed when the top frame navigates.
  • Access is removed when the webpage goes away, such as a tab close.

In addition, the browser may decide to remove access on a timeout basis or on some dedicated user action such as switching cookie policy.

WebKit Specifics

WebKit's implementation of Storage Access API will be available in Safari Technology Preview soon and on by default. It only covers cookie access, i.e. no other storage mechanisms and the partitioning of them is affected by a call to requestStorageAccess() at this point.

@annevk
Copy link
Member

annevk commented Jan 10, 2018

As for specification location, a more logical fit might be https://github.com/whatwg/storage including navigator.storage as a point to hang these APIs of.

My main concern here is with prompting the user on behalf of a third-party. I'd really like us to move to a world where all UI prompts come from a place that matches the address bar. "I'm on example.com, why do I get a prompt from "elsewhere.example?" is real problematic and not something we should further enshrine.

@johnwilander
Copy link
Author

I contemplated navigator but since 1) storage is only granted to this document and 2) it changes document.cookie, I felt document was a better fit.

A prompt may be phrased as having to do with both the third and first party — “Would you like to use payment.com under store.com?”
How would the browser otherwise get informed consent from the user, assuming it has decided it needs to ask?

@annevk
Copy link
Member

annevk commented Jan 10, 2018

I'm not sure how to ask such a question in a way that isn't confusing, which is why I'd rather not ask it.

If this is solely about cookies and document-bound, https://github.com/whatwg/html is probably the best place, as that defines document.cookie and its integration with the Cookie RFC.

(This also feels very similar to https://www.w3.org/TR/tracking-dnt/#exceptions which nobody ended up implementing as far as I know.)

@wanderview
Copy link
Member

If this is not meant to cover all storage, please don't name the API using "storage".

Personally, it seems to me this permission should probably apply to all storage since users don't really understand the difference between cookies and other storage.

It would be helpful to have an example prompt that seems understandable to users.

@johnwilander
Copy link
Author

As I mention in the proposal, this is intended to cover multiple types of storage. WebKit's first implementation only covers cookies but that's a limitation on us.

We don't have an example prompt because our current implementation is prompt-less. However, we want browsers to have the option of prompting because there might be abuse of the API or the browser may want to ensure user consent before any third-party is allowed storage access.

@johnwilander
Copy link
Author

Anne, I have opened an issue with the HTML spec. Thanks!

All, let's continue the discussion at whatwg/html#3338.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

3 participants