-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sec-Fetch-Site utility for resources that need to be exposed cross-site #11
Comments
IMO, it does. We initially proposed sending the actual origin, and got a reasonable amount of pushback (see the conversation ending in whatwg/fetch#700 (comment)). I'd still like to send the origin, but sending this enum has some value in itself, and seems like the right place to start, given the way the conversation evolved. |
What @mikewest said :) One reason why I'm okay living without this information in With CORP, a server that sets the header doesn't have information that allows it to determine which endpoints are loaded cross-origin and build the list of endpoints to opt out -- which makes it quite difficult to avoid accidentally breaking some legitimate loading scenarios. Note that all of this applies only to |
Thanks for the explanations! I am fine with closing this issue as WontFix - just wanted to check that this aspect of the design has been taken into account and won't impact adoption too much. |
Yeah, I'd definitely prefer to have origin information available for making security decisions, but I expect that its lack won't be a dealbreaker in this context, even if it makes deployments harder. Still, there are some interesting complementary ideas such as sending the |
When discussing Cross-Origin Resource Policy v1, @arturjanc mentioned that
Doesn't the same problem apply to
Sec-Fetch-Site
? As currently proposed the header values are limited to "cross-site
", "same-origin
", and "same-site
" - when seeing a "cross-site
" value the server won't be able to distinguish between https://friendly.origin.at.another.site.com VS https://attacker.com, right?The text was updated successfully, but these errors were encountered: