Who Could/Would Use This?
Banks, healthcare? (not early adopters though)
Specific apps (mail, docs, sign-in, …) (likely)
Social networks? (possibly not? They need composability)
Authentication providers? (cross-origin OAuth pop-up troubles?)
…?
Artur made the good point that if we could provide more than just defense against UXSS and Spectre, it could be more compelling to developers. However, just getting any process isolation is hard enough, and perhaps we should focus on a minimum viable product first.
TODO short-term: CORB? window.open issues? From-Origin response header? (From-Origin request header, possibly?) Put these together, and see if they defend against Spectre, what we gain, what we still lack, et c.
Scope Of Isolation?
Isolatee is site?
Isolatee is origin?
Isolatee is WebKit partition (eTLD+1, scheme not considered) (insufficient for Spectre defense)
Affiliated domains/friend origins/et c.?
Possible Signalling Mechanisms?
Header (would apply to entire isolatee after first seen? What about existing resource loads?)
Well-known URL (would apply to entire isolatee)?
Origin Manifest? (seems best, but is a dependency that must be resolved first — it is not finished yet)
Definition(s) Of Isolation?
Separate process/address space (required)
CORB, and safe-listed headers (required)
Double-keyed cookies/storage?
All cookies implicitly SameSite?
Isolatee cannot be framed?
Entry point/navigation restrictions?
…?
Lost Features?
Isolatee cannot frame other sites/origins?
No ability to write to document.domain?
window.opener = null? Unless opener is same as isolatee?
Cookies for authentication on top-level request if all cookies are strict SameSite
…?
Hi all,Thanks for coming to the meeting yesterday. I think we made some headway! Now let's make some more. :)Here's my questions doc from the meeting, in email form:Who Could/Would Use This?
Banks, healthcare? (not early adopters though)
Specific apps (mail, docs, sign-in, …) (likely)
Social networks? (possibly not? They need composability)
Authentication providers? (cross-origin OAuth pop-up troubles?)
…?
Artur made the good point that if we could provide more than just defense against UXSS and Spectre, it could be more compelling to developers. However, just getting any process isolation is hard enough, and perhaps we should focus on a minimum viable product first.
--
You received this message because you are subscribed to the Google Groups "isolation-policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isolation-poli...@chromium.org.
To post to this group, send email to isolatio...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/isolation-policy/CAOuvq23%2BYqsStrZO95psavLHge16H%2BH07PCGxqJn_V0%3DSmb1Eg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/isolation-policy/8C97836B-98D4-4E9A-9B6A-4D96A1931F40%40apple.com.
Hi all,Thanks for coming to the meeting yesterday. I think we made some headway! Now let's make some more. :)
Here's my questions doc from the meeting, in email form:Who Could/Would Use This?
Banks, healthcare? (not early adopters though)
Specific apps (mail, docs, sign-in, …) (likely)
Social networks? (possibly not? They need composability)
Authentication providers? (cross-origin OAuth pop-up troubles?)
…?
Artur made the good point that if we could provide more than just defense against UXSS and Spectre, it could be more compelling to developers. However, just getting any process isolation is hard enough, and perhaps we should focus on a minimum viable product first.
Additionally, Emily asks:High-level, I think we should clarify which of these 2 problems we're trying to solve (or neither, or both):
- An opt-in to restrict just enough functionality so that other browsers can implement some form of site isolation
- A useful isolation feature which happens to restrict enough functionality that other browsers can use it as a signal to opt in isolated sites into some form of site isolation
TODO short-term: CORB? window.open issues? From-Origin response header? (From-Origin request header, possibly?) Put these together, and see if they defend against Spectre, what we gain, what we still lack, et c.
Scope Of Isolation?
Isolatee is site?
Isolatee is origin?
Isolatee is WebKit partition (eTLD+1, scheme not considered) (insufficient for Spectre defense)
Affiliated domains/friend origins/et c.?
Possible Signalling Mechanisms?
Header (would apply to entire isolatee after first seen? What about existing resource loads?)
Well-known URL (would apply to entire isolatee)?
Origin Manifest? (seems best, but is a dependency that must be resolved first — it is not finished yet)
Definition(s) Of Isolation?
Separate process/address space (required)
CORB, and safe-listed headers (required)
Double-keyed cookies/storage?
All cookies implicitly SameSite?
Isolatee cannot be framed?
Entry point/navigation restrictions?
…?
Lost Features?
Isolatee cannot frame other sites/origins?
No ability to write to document.domain?
window.opener = null? Unless opener is same as isolatee?
Cookies for authentication on top-level request if all cookies are strict SameSite
…?
--
You received this message because you are subscribed to the Google Groups "isolation-policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isolation-policy+unsubscribe@chromium.org.
No ability to write to document.domain?
I think this is probably acceptable if we make From-Origin a website "strict mode"., but it will also get in the way of people using the header.That being said, it may encourage people who only care about Chrome (which unfortunately do exist) to use the header anyway, as it will improve security even in browsers with full site isolation.If we have domain disabled, we can modify the definition of a "site" to reflect that.
window.opener = null? Unless opener is same as isolatee?
I think there are too many uses for cross-origin window.opener (such as OAuth), so we won't be able to get away with this. We can potentially get away with a more restrictive version of what you're allowed to do across dissimilar-origin toplevel browsing contexts though.
Cookies for authentication on top-level request if all cookies are strict SameSite
I'm not sure what this buys us?
…?
--
You received this message because you are subscribed to the Google Groups "isolation-policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isolation-poli...@chromium.org.
To post to this group, send email to isolatio...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/isolation-policy/CAOuvq23%2BYqsStrZO95psavLHge16H%2BH07PCGxqJn_V0%3DSmb1Eg%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "isolation-policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isolation-poli...@chromium.org.
To post to this group, send email to isolatio...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/isolation-policy/CAKN_%3DPJinN8BNX5UuEBes-LiJ1r1fqP2EGMhJg1-QtpprefTgA%40mail.gmail.com.
On Apr 20, 2018, at 3:27 PM, Chris Palmer <pal...@chromium.org> wrote:So, is our best next move to revive From-Origin?With the implicit understanding?, or an explicit addition?, along the lines of, "if the resource has the From-Origin response header and is a top-level document, the UA MAY provide further isolation, such process isolation blah blah, et c.”?
--
You received this message because you are subscribed to the Google Groups "isolation-policy" group.
To unsubscribe from this group and stop receiving emails from it, send an email to isolation-poli...@chromium.org.
To post to this group, send email to isolatio...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/isolation-policy/CAH%2B8MBYgmYoc9uJP-qO8qoYStTXu7NgbMCY7VfyN7Mw7zoup6w%40mail.gmail.com.
I don’t think it makes sense to call out implementation fails such as process isolation in the standards. e.g. some browser vendors may opt to never implement process isolation and implement VM level mitigations. e.g. there are some hardwares in which process isolations aren’t necessary to protect against Spectre.
So, is our best next move to revive From-Origin?With the implicit understanding?, or an explicit addition?, along the lines of, "if the resource has the From-Origin response header and is a top-level document, the UA MAY provide further isolation, such process isolation blah blah, et c."?
Can we achieve this by adding an option to From-Origin, or is it better to have a whole new header?