Skip to content

Cross Origin Opener Policy: clarify what should happen with insecure context interactions #5539

@empijei

Description

@empijei

The current proposal states that

This should only work over a secure context.

But this could be potentially misunderstood by people that are implementing the spec and allow for trivial bypasses:

Scenario:

window A (COOP null) on http://evil.com opens window B (COOP same-origin) on https://victim.com

I would hope that https://victim.com could still be protected by COOP, even if in this case it is not inside a secure context.
I would expect COOP to cause a new context to be created and the connection with evil.com to be broken.

Metadata

Metadata

Assignees

No one assigned

    Labels

    impacts documentationUsed by documentation communities, such as MDN, to track changes that impact documentationtopic: cross-origin-opener-policyIssues and ideas around the new "inverse of rel=noopener" header

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions