[tahoe-lafs-trac-stream] [tahoe-lafs] #1797: WUI: view content in an HTML5 sandboxed iframe

tahoe-lafs trac at tahoe-lafs.org
Tue Aug 28 18:40:56 UTC 2012


#1797: WUI: view content in an HTML5 sandboxed iframe
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:
  davidsarah             |     Status:  new
         Type:  defect   |  Milestone:  soon
     Priority:  major    |    Version:  1.9.2
    Component:  code-    |   Keywords:  wui security usability javascript
  frontend-web           |  sandbox same-origin
   Resolution:           |
Launchpad Bug:           |
-------------------------+-------------------------------------------------

Comment (by davidsarah):

 Grr, Chrome lost my comment. Will try to reconstruct:

 Which permissions can we allow on an [http://www.whatwg.org/specs/web-apps
 /current-work/multipage/the-iframe-element.html#the-iframe-element iframe
 sandbox attribute]?

 {{{allow-same-origin}}}:
  * No, that would defeat the purpose of sandboxing for us.

 {{{allow-top-navigation}}}:
 {{{allow-popups}}}:
  * No, the navigated frame or popup would be outside the sandbox. The
 sandbox mechanism does not prevent an attacker from navigating directly to
 the unsandboxed content from their own site, but we want to prevent this
 from happening accidentally.

 {{{allow-scripts}}}:
  * Probably OK. We don't care if the sandboxed content can run scripts as
 long as they're in a unique origin. OTOH, this does potentially increase
 the attack surface for browser bugs.

 {{{allow-forms}}}:
  * Probably OK, but it's not clear to me what security property this is
 enforcing at all (since forms can in any case be submitted cross-origin).

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1797#comment:2>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list