-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Is "file:" protocol considered a "secure context", if not why? #66
Comments
Historically But here's an attack. Convince a user to download an HTML file containing malicious script, and then open the HTML file locally (e.g. Relevant discussion at: whatwg/html#3099 |
It is kind of weird though that this spec treats Right now the "file" branch is pretty much the only branch in that algorithm with no explaining note, and it's easy to miss that despite the explicit file=trustworthy branch, file URLs generally aren't actually treated as trustworthy. |
How is that attack different from an attack (or simply visiting any web site; e.g., browser fingerprinting) at a different protocol, The entire world wide web is inherently insecure. As of last century 20TB a second was being read and analyzed in real-time over any arbitrary wire. That fact is verifiable by the primary sources. |
@inexorabletash Only posted this issue due to being referred here re using Native Filesystem at
(AT THE FRONTEND 2016 - Real time front-end alchemy, or: capturing, playing, altering and encoding video and audio streams, without servers or plugins! by Soledad Penadés) or, put in another way, in the immortal words of Suga Free (Angry Enuff)
where have found more than one bug at more than one FOSS browsers testing API's and code at
In the former case it is unlikely that would have found the bug at Firefox if had not tested code over and over again at In the latter case, the user is far less "secure" (in fact, not secure at all; that is, if they consider their voice being recorded and sent to an undisclosed third-party for an undisclosed storage time and potential further undisclosed third-party usage) using The case of
any GitHub repository that is downloaded and executed has the same vector; e.g., a shell (or even to an appreciable degree, HTML, CSS, JavaScript shipped with the browser) script in code could execute a directory read/write operation (when permissions are granted or not); or launch Chrome from the script after having read the local directories; etc. Therefore, marking a particular context as "secure" could be a misnomer in certain cases. To the extent that this specification has influence over the Native Filesystem API am only requesting clarification as to how use of that API at |
@mkruisselbrink The only reason posted this issue is for the purpose of somehow allowing the API at |
Is
file:
protocol considered a secure context? Is reading and writing to the user filesystem atfile:
protocol considered to be any less "secure" than JavaScript code a web site reading and writing to the user filesystem where thehttps:
protocol is being used? If so, for what technical reasons?Given that any and all external network communications can be considered insecure,
file:
protocol, specifically within the scope of Native File System https://github.com/WICG/native-file-system should be considered a "secure context", where no external network communication is necessary.(Was referred to this specification from WICG/file-system-access#58 (comment))
The text was updated successfully, but these errors were encountered: