Open
Bug 1670242
(site-isolation-principal-vetting)
Opened 4 years ago
Updated 9 months ago
[meta] Harden Site-Isolation by introducing IPC based Principal vetting
Categories
(Core :: DOM: Security, task, P3)
Core
DOM: Security
Tracking
()
ASSIGNED
People
(Reporter: ckerschb, Assigned: ckerschb)
References
(Depends on 8 open bugs, Blocks 1 open bug)
Details
(Keywords: meta, Whiteboard: [domsecurity-meta])
When we load a document in Fission, we load URL into a specific content process. Within this project we wanna make sure that a URL assigned to a specific content process can only send Principals up to the parent process that match the URL of that content process.
While that obviously does not work in all the cases, because e.g. we create Principals for images loaded into a document which might be cross origin, the TriggeringPricnipal
should always match the URL of the content process.
We will need a multitude of sub bugs for this project to realize, because there a multitude of different load scenarios, so let's keep this bug as a meta bug.
Assignee | ||
Updated•4 years ago
|
Severity: -- → N/A
Priority: -- → P3
Updated•4 years ago
|
Depends on: fission-ipc-map
Updated•4 years ago
|
Blocks: fission-site-sandbox
Assignee | ||
Updated•4 years ago
|
Alias: site-isolation-principal-vetting
Assignee | ||
Updated•4 years ago
|
You need to log in
before you can comment on or make changes to this bug.
Description
•