You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I screwed up Chrome's implementation, which lead to folks depending on the behavior,
which made it more or less impossible for other vendors to do the right thing. Sorry,
Internet. I let you down. :(
Closes#42.
<p>The following features are at-risk, and may be dropped during the CR period: </p>
1512
1512
<ul>
1513
1513
<li>The <adata-link-type="dfn" href="#sandboxed-secure-browsing-context-flag" id="ref-for-sandboxed-secure-browsing-context-flag">sandboxed secure browsing context flag</a> defined in <ahref="#monkey-patching-sandbox-flags">§2.2.1 Sandboxing</a>, as well as its usage in <ahref="#is-settings-object-contextually-secure">§3.1 Is an environment settings object contextually secure?</a>. [<ahref="#issue-255ee4a4">Issue 2</a>]
1514
-
<li>The <code>opener</code> restriction on popups. [<ahref="#issue-8ea95bab">Issue 5</a>]
1515
1514
</ul>
1516
1515
<p>“At-risk” is a W3C Process term-of-art, and does not necessarily imply that the feature is in danger of being dropped or delayed. It means that the WG believes the feature may have difficulty being interoperably implemented in a timely manner, and marking it as such allows the WG to drop the feature if necessary when transitioning to the Proposed Rec stage, without having to publish a new Candidate Rec without the feature first.</p>
<p>Top-level documents are secure as long as they don’t have a non-secure <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/browsers.html#opener-browsing-context" id="ref-for-opener-browsing-context">opener browsing context</a>. This is a bit convoluted, so let’s go straight
1626
-
to the examples:</p>
1627
1624
<divclass="example" id="example-c3b67557">
1628
1625
<aclass="self-link" href="#example-c3b67557"></a>
1629
1626
<p><code>http://example.com/</code> opened in a <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/browsers.html#top-level-browsing-context" id="ref-for-top-level-browsing-context">top-level browsing
@@ -1648,61 +1645,29 @@ <h3 class="heading settled" data-level="1.1" id="examples-top-level"><span class
1648
1645
</g>
1649
1646
</svg>
1650
1647
</div>
1651
-
<divclass="example" id="example-601f9a50">
1652
-
<aclass="self-link" href="#example-601f9a50"></a>
1653
-
<p>
1654
-
If a secure context opens <code>https://example.com/</code> in a new
1655
-
window, that new window will be a secure context, as it is both secure on
1656
-
its own merits, and was opened from a secure context:
<pathd="M150, 87 C 200 75, 350 75, 150 287"></path>
1696
1664
</g>
1697
1665
</svg>
1698
-
<p>The link can be broken via the <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/links.html#link-type-noopener" id="ref-for-link-type-noopener">link type "<code>noopener</code>"</a>, meaning
1699
-
that the following will both produce secure contexts:</p>
var w = window.open("https://example.com/", "", "<adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/links.html#link-type-noopener" id="ref-for-link-type-noopener②">noopener</a>");
1704
-
</script>
1705
-
</pre>
1666
+
</div>
1667
+
<divclass="example" id="example-4cfa3d2b">
1668
+
<aclass="self-link" href="#example-4cfa3d2b"></a>
1669
+
<p>Likewise, if a non-secure context opens <code>https://example.com/</code> in a new window,
1670
+
that new window will be a secure context, even through its opener was non-secure:</p>
<p><var>document</var>’s <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/origin.html#active-sandboxing-flag-set" id="ref-for-active-sandboxing-flag-set">active sandboxing flag set</a> contains the <adata-link-type="dfn" href="#sandboxed-secure-browsing-context-flag" id="ref-for-sandboxed-secure-browsing-context-flag②">sandboxed secure browsing context flag</a>.</p>
2058
2023
<pclass="note" role="note"><span>Note:</span> This check is "at risk". See <ahref="#monkey-patching-sandbox-flags">§2.2.1 Sandboxing</a> for details.</p>
2059
-
<lidata-md="">
2060
-
<p><var>document</var> has an <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/browsers.html#creator-browsing-context" id="ref-for-creator-browsing-context">creator browsing context</a> (<var>context</var>), and <var>context</var>’s <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/browsers.html#creator-context-security" id="ref-for-creator-context-security">creator context security</a> is "<code>Not Secure</code>".</p>
2061
-
<pclass="note" role="note"><span>Note:</span> Since we take account of <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/browsers.html#creator-browsing-context" id="ref-for-creator-browsing-context①">creator browsing contexts</a>'
2062
-
status, a popups' status depends on how it is opened, as discussed
2063
-
in <ahref="#examples-top-level">§1.1 Top-level Documents</a>.</p>
2064
-
<pclass="issue" id="issue-8ea95bab"><aclass="self-link" href="#issue-8ea95bab"></a> This exclusion is "at risk",
2065
-
as implementation is lagging, and there’s some discussion as to
2066
-
whether or not it can be softened while maintaining the mitigations
2067
-
against direct communication channels. <ahref="https://github.com/w3c/webappsec-secure-contexts/issues/42"><https://github.com/w3c/webappsec-secure-contexts/issues/42></a></p>
2068
2024
<lidata-md="">
2069
2025
<p><var>settings</var>’s <adata-link-type="dfn" href="https://html.spec.whatwg.org/multipage/webappapis.html#https-state" id="ref-for-https-state②">HTTPS state</a> is "<code>deprecated</code>".</p>
<divclass="issue"> This is currently defined in Step 11.4.2 of the WHATWG’s HTML (landed in <ahref="https://github.com/whatwg/html/pull/1560">whatwg/html#1560</a>. It has not yet been
2570
2522
picked up by the W3C’s version of that algorithm. <ahref="https://github.com/w3c/workers/issues/6"><https://github.com/w3c/workers/issues/6></a><ahref="#issue-39cab00b"> ↵ </a></div>
2571
2523
<divclass="issue"> Upstream this to HTML.<ahref="#issue-10e3374e"> ↵ </a></div>
2572
-
<divclass="issue"> This exclusion is "at risk",
2573
-
as implementation is lagging, and there’s some discussion as to
2574
-
whether or not it can be softened while maintaining the mitigations
2575
-
against direct communication channels. <ahref="https://github.com/w3c/webappsec-secure-contexts/issues/42"><https://github.com/w3c/webappsec-secure-contexts/issues/42></a><ahref="#issue-8ea95bab"> ↵ </a></div>
At Risk: The <a>sandboxed secure browsing context flag</a> defined in [[#monkey-patching-sandbox-flags]], as well as its usage in [[#is-settings-object-contextually-secure]]. [<ahref="#issue-255ee4a4">Issue 2</a>]
22
-
At Risk: The `opener` restriction on popups. [<ahref="#issue-8ea95bab">Issue 5</a>]
0 commit comments