LGTM1.Though this intent doesn't have UseCounter data, the number of affected page views must be very low.
On Thu, Mar 2, 2017 at 6:57 PM, Mike West <mk...@chromium.org> wrote:
Ping Mike on Domenic's CORS question.
On Tue, Mar 7, 2017 at 1:09 PM TAMURA, Kent <tk...@chromium.org> wrote:
LGTM1.Though this intent doesn't have UseCounter data, the number of affected page views must be very low.
On Thu, Mar 2, 2017 at 6:57 PM, Mike West <mk...@chromium.org> wrote:
https://bugs.webkit.org/show_bug.cgi?format=multiple&id=100892
(Yes. We should absolutely write this down somewhere other than a 5-year old bug on WebKit's tracker. And in The Glorous But ~Distant Future, we'll want to align this with https://wicg.github.io/reporting/. This feature is basically under-loved and under-specified.)The XSS Auditor's violation reports are now sent with a MIME type of `application/xss-auditor-report` (as opposed to `application/json` which we're sending in the status quo).MotivationIt's a bad idea to give folks the ability to send `application/json` requests cross-origin to arbitrary endpoints without CORS enforcement. While there's no concrete attack we've seen based on this capability, and the risk is mitigated by the fact that the browser remains in control of the JSON payload delivered, it's advisable to change to a less overloaded MIME type that gives server operators the ability to filter their incoming traffic in a reasonable way. Firefox: No XSS AuditorEdge: No reporting functionality in their XSS AuditorSafari: No public signals, filed:Web developers: No signalsNone. Yes. https://bugs.chromium.org/p/chromium/issues/detail?id=691726 https://www.chromestatus.com/features/6227193935953920 Yes. *cough* I've actually already landed this in https://codereview.chromium.org/2717463006. It should have occurred to me to send an I2S, regardless of the feature's quasi-proprietary nature. :(-mike
How does using CORS going forward work? Every existing setup will
break because they suddenly get CORS preflights they won't be equipped
to answer.
I also thought these fetches would go without credentials,
but suddenly they are with?
On Tue, Mar 7, 2017 at 9:52 AM, Anne van Kesteren <ann...@annevk.nl> wrote:How does using CORS going forward work? Every existing setup will
break because they suddenly get CORS preflights they won't be equipped
to answer.Right. That's the point I was trying to make. :) Changing the existing reporting mechanisms to require preflights for cross-origin endpoints would be difficult because of existing usage. I'm suggesting that a good way to get to a better place in the future is to build out a centralized reporting mechanism we're happy with, deprecate the old mechanisms, and migrate over time.
OK, so if this is just one of many mechanisms that doesn't use CORS, let's put that question to the side for this intent. The lack of a spec is not great, but blocking the MIME type change on the creation of a spec for the whole feature doesn't seem reasonable. LGTM2.
On Tue, Mar 7, 2017 at 6:21 PM 'Mike West' via blink-dev <blin...@chromium.org> wrote:On Tue, Mar 7, 2017 at 9:52 AM, Anne van Kesteren <ann...@annevk.nl> wrote:How does using CORS going forward work? Every existing setup will
break because they suddenly get CORS preflights they won't be equipped
to answer.Right. That's the point I was trying to make. :) Changing the existing reporting mechanisms to require preflights for cross-origin endpoints would be difficult because of existing usage. I'm suggesting that a good way to get to a better place in the future is to build out a centralized reporting mechanism we're happy with, deprecate the old mechanisms, and migrate over time.As long as failure is an option, that sounds good. In other words, the fewer the differences are between the old and the new the better, because we might have both forever :)