#582: "credentialless" embedder policy.
Discussions
2021-01-Kronos
David: Mike west asked for review of credentialess embedder policy...
David: connected to SPECTRE mitigation...
Dan: I would like more context in the explainer - getting at the user need and the issue with SPECTRE veunerablity...
David: browsers can't trust the CPU to maintain isolation between processes anymore.
David: ways to turn sharedarraybuffer back on...
Dan: left comment
David: need to digest a bit more... Seems not unreasonable on the surface.
2021-02-08
Dan: let's schedule a breakout on this at the plenary. Maybe we can get Mike to join as well.
2021-02-08
Amy: not much to report - David said looks reasonable but a lot to digest. Recent comments from today.
2021-03-08
Yves: it's under discussion. Multiple proposals. My position is to recommend they pick the solution that is the easiest to use for an end user (web developers) and easiest to understand so it doesn't add extra complexity. Will send feedback later.
Dan: propose close.. until they have something specific to review.
2021-07-05
Dan: they are moving this to WICG. They've changed something about the approach and wanted us to reopen
Yves: no longer about communication between iframe, but subresource loading in an anonymous way
Dan: what additional value can we add? They asked to reopen because our response no longer fit. We said yes that sounds fine, but the 'that' is something the ended up not choosing
Yves: as it's a completely stripped down version of the original proposal I'll need to take a look again, and ensure different stakeholders agree, which might happen in WICG
Dan: take a look and agenda for next week?
Yves: yes
2021-07-05
Yves: re-opened - they changed the Use case..
Yves: use case is comms between iframes / popups and main document - mostly for webassembly - they used sharedarray buffer - and for payments. The goal is to allow it and gate it in some way - not open to any iframe. The change is the way to restrict / not restrict it. The current issue - allow subresources like images to be loaded credentialless instead of sending credentials - which is the default for using non-cors subresources.
Dan: left a comment about venue
2021-07-12
Yves: specific issue with service worker and cache.... looked at discussion. 2 different caches could be a mitigation - one private cache with credential and one without.
Dan: mark proposed close and close at plenary?
Yves: I will leave some comments in the issue
2021-07-26
Yves: looks good to me - would like to see in caches differentiation between what is retreived with and without credentials - eg. service worker and native cache of the browser. If everyone is happy with that, i can send that comment.
OpenedDec 3, 2020
Guten TAG!
I'm requesting a TAG review of a "credentialless" cross-origin embedder policy mode.
Today,
COEP: require-corp
exists, and is used to enable cross-origin isolation (and thereforeSharedArrayBuffer
, etc). It is functional and solid, but turns out to be difficult to deploy at scale, as it requires all subresources to explicitly opt-in. This is fine for some sites, but creates dependency problems for sites that gather content from users (Google Earth, social media generally, forums, etc). https://github.com/mikewest/credentiallessness/ suggests an alternative that might have better deployment characteristics: strip credentials from outgoing requests by default, and send them only for CORS-enabled requests. In this model, resources would either explicitly opt-into sharing themselves with the requestor, or would be low-risk, insofar as it's less likely to contain personal information if browser-controlled identifiers like cookies aren't included.Further details:
You should also know that: the subresource bits of this proposal seem pretty clear to me, and I have some reasonable amount of confidence that they make sense. Frames are harder, and I'd appreciate y'all's thoughts. I'd also appreciate your help weighing the impact of non-cookie based ACLs, and the potential dependency upon CORS-RFC1918 (which y'all are reviewing in https://github.com/w3ctag/design-reviews/issues/572. It might also be helpful to review conversations like https://github.com/whatwg/html/issues/4175#issuecomment-466047231 where @clelland originally surfaced this suggestion.
We'd prefer the TAG provide feedback as:
💬 a comment in this issue and @-notify the folks above.