01:11 | <duryodhan> | hi folks .. where do I report possible errors in the HTML5 spec. Its a trivial but important bug: the Fetch algorithm http://www.whatwg.org/specs/web-apps/current-work/multipage/fetching-resources.html#fetch doesn't actually check the same-origin flag. It only does so after a redirect. |
01:12 | <duryodhan> | Is Hixie the right person to ping about this? |
01:13 | <annevk> | origin is checked before the request is made |
01:13 | <annevk> | before fetch is invoked, that is |
01:18 | <annevk> | duryodhan: ^^ |
01:18 | <duryodhan> | annevk: can't find that check at http://www.whatwg.org/specs/web-apps/current-work/multipage/workers.html#dom-workerglobalscope-location |
01:19 | <duryodhan> | it just seems like a better idea to do the check inside the fetch url .. what does it even mean to do a cross origin fetch with same-origin flag set? If it redirects to the same domain it will be disallowed ? |
01:21 | <annevk> | duryodhan: http://www.whatwg.org/specs/web-apps/current-work/multipage/workers.html#dom-worker |
01:22 | <annevk> | duryodhan: I'm not sure that you can ever get into that situation, but maybe the spec should indeed point that out |
01:23 | <duryodhan> | annevk: ohh yeah .. noticed. |
01:23 | <duryodhan> | yeah to me it seems like unnecessary to require all calls to fetch to do teh same origin check themselves |
01:24 | <annevk> | I don't think all calls do such a check |
01:24 | <annevk> | but maybe now with CORS that changed |
01:24 | <annevk> | at some point CORS/fetch needs to merged |
01:24 | <annevk> | but we're gonna wait with that |
01:33 | annevk | wonders where myakura is |
01:34 | annevk | thinks myakura should deal with http://lists.w3.org/Archives/Public/public-webapps/2011OctDec/1209.html :p |
10:49 | <ashaw> | hey, I was wondering if there was a way of telling a web browser to not allow any external embedding of javascript in a document and to dissbale eval? |
10:51 | <ashaw> | because as far as I can see there is not, and this would be a useful security feature for the web |
11:05 | <bga_> | ashaw http://www.w3schools.com/html5/att_iframe_sandbox.asp |
11:06 | <ashaw> | but can I do it outside of an iframe |
11:07 | <bga_> | => wrap all page into iframe |
11:08 | <ashaw> | That is kind of useless |
11:09 | <ashaw> | and will cause useability problems with, giving the most basic example, and iphone |
11:09 | <bga_> | sec |
11:10 | <ashaw> | Also I want to load scripts, but only thoes originally embeded in the html of the page, no other scripts |
11:11 | <ashaw> | so above also does not do what I want |
11:12 | <bga_> | ashaw you can use dommutation events, catch any attemp to add <script> and dont allow set src |
11:12 | <ashaw> | and how do you deal with eval? |
11:12 | <bga_> | by replacing src attibute and setAttribute fn |
11:13 | <bga_> | oh eval |
11:13 | <bga_> | ashaw user still can use cross origin XHR and eval/Fn, ok |
11:14 | <bga_> | but you can wrap XHR too :) |
11:14 | <ashaw> | yeah, but this is now becoming complex and vunerable to bugs |
11:15 | <ashaw> | and what if they then do and overwride your handler |
11:16 | Philip` | thought mutation events were generally agreed to be evil and never to be used |
11:17 | <Philip`> | ashaw: Maybe you want something a bit like https://developer.mozilla.org/en/Security/CSP ? |
11:20 | <bga_> | ashaw dont forget that user can download resource via <img> & canvas, <link>, <object> and <embed> |
11:21 | <ashaw> | I was about to mention them |
11:21 | <ashaw> | That CSP stuff seems good |
11:23 | <ashaw> | but only firefox? |
11:24 | <ashaw> | does webkit, IE, opera offer anything similar? |
11:28 | <ashaw> | so webkit is impelmenting support |
11:32 | <bga_> | https://docs.google.com/present/view?id=dz4jvnj_54hrjnwpdc&pli=1 |
11:41 | <ashaw> | cool, but not quite applicable |
11:43 | <bga_> | i like typesafe router |
11:48 | <ashaw> | So do I |