-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SRI: Should the about: scheme be whitelisted? #319
Comments
I agree. we shouldn't mandate. |
I added this originally to deal with I'd suggest something like step 5/6 from https://w3c.github.io/webappsec/specs/powerfulfeatures/#is-origin-trustworthy to future-proof this, allowing UAs to whitelist things like |
hmm .. I think that doesn't need to be whitelisted. If you specify a SRI value, then chrome-extension:// loads should also check hash. In the future, we might talk about this in the context of "require-for-all" directive where we might say "dont inherit the require directive for iframes in chrome-extension://" etc. |
@mikewest does |
(I think we can be fairly sure that the definition of |
hmm @annevk I didn't understand your last comment. can you clarify? |
I think @annevk is suggesting that we whitelist |
Ack, I think whitelisting |
fine by me; although, to confirm my understanding, I would be curious: why would we need this in SRIv1? I can see value of this for iframes, which implicitly have an about:blank navigation. |
right… Let's just go with #390 then. |
Yeah, I agree
|
SRI: stop whitelisting the `about` scheme (fix #319)
…rscores, so you can have terms/headings that differ only by presence of a dash. Fixes w3c#319.
In #280, @mozfreddyb asks: "should we really mandate that the about: scheme has always good integrity? It may be current practice, but I don't think we should rely on about things being from-disk content until eternity."
The text was updated successfully, but these errors were encountered: