#578: Require embedees to opt-in.
Discussions
Comment by @lknik Nov 26, 2020 (See Github)
From a personal perspective this is a very interesting proposal security-wise, so I would simply support it as is. The catchy issue is indeed rollout - so the potential for breaking how stuff works today. It is addressed in your explainer, but I wonder how to reach the smaller sites? Maybe at first stage a site should be marked as unsafe (url-bar)?
Comment by @mikewest Dec 1, 2020 (See Github)
Thanks, @lknik! Reaching the long tail of sites is, indeed, important. I hope we'll be able to do so effectively via mechanisms like blog posts and tooling (devtools, lighthouse/observatory, deprecation reports, securityheaders.io and similar, etc). I don't think marking sites as unsafe because they embedded a page that didn't opt-in will be terribly effective, as the warning would seem to accrue to the wrong entity (embedder rather than embedee), but I'm open to additional ideas!
Discussed
Jan 1, 2021 (See Github)
No issues except compat concerns.
Comment by @hober Jan 26, 2021 (See Github)
#76 seems relevant...
Comment by @hober Jan 27, 2021 (See Github)
Hi @mikewest!
@cynthia, @plinss and I looked at this today during our vF2F. We recognize the value in moving the web in this direction, and also that it's risky from a compat standpoint. If you decide to try it, let us know how it goes & if it turns out to be doable.
OpenedNov 25, 2020
Guten TAG!
I'm requesting a TAG review of requiring embedees to opt-into (rather than -out of) being embedded in cross-origin documents.
Documents can embed anything they like via
<frame>
,<iframe>
, etc., exposing those embedded resources to a number of attacks, ranging from the well-known risks of clickjacking to the less-understood side-channel risks of XSLeaks and Spectre. Developers can mitigate these risks by choosing to limit the ways in which particular resources can be embedded. TheX-Frame-Options
header and CSP's more-granularframe-ancestors
directive both provide developers with a measure of defense, but developers must choose to use them.We should change the web's defaults such that an explicit declaration is necessary to enable cross-origin embedding a given document. That is, we'd treat the absence of an explicit
X-Frame-Options
orframe-ancestors
declaration as having more or less the same behavior asX-Frame-Options: SAMEORIGIN
.Further details:
We'd prefer the TAG provide feedback as leave review feedback as a comment in this issue and @-notify @mikewest.
Thanks for your work!