Should the suspicious-auth warning apply to all loads? Should URI userinfo be banned?
Categories
(Core :: Networking, defect, P2)
Tracking
()
People
(Reporter: rinsmaster, Unassigned)
References
Details
(Keywords: sec-want, Whiteboard: [sg:investigate] [necko-triaged] [necko-priority-next][patch-available])
Attachments
(1 file)
Comment 1•16 years ago
|
||
Reporter | ||
Comment 2•16 years ago
|
||
Reporter | ||
Comment 3•16 years ago
|
||
Comment 4•16 years ago
|
||
Comment 5•16 years ago
|
||
Comment 6•16 years ago
|
||
Updated•16 years ago
|
Comment 8•12 years ago
|
||
![]() |
||
Comment 9•10 years ago
|
||
Updated•9 years ago
|
Comment 11•8 years ago
|
||
Comment 12•8 years ago
|
||
Comment 14•2 years ago
|
||
In the process of migrating remaining bugs to the new severity system, the severity for this bug cannot be automatically determined. Please retriage this bug using the new severity system.
Updated•2 years ago
|
Comment 15•2 years ago
|
||
Investigate what other browsers are doing and align to spec.
Comment 16•2 years ago
|
||
I see we have https://wpt.fyi/results/fetch/security/embedded-credentials.tentative.sub.html?label=experimental&label=master&aligned&view=subtest that deals with this case.
Chrome appears to block cross origin subresources with credentials. I think we should try to do the same.
Updated•2 years ago
|
Updated•2 years ago
|
Comment 17•2 years ago
|
||
Updated•2 years ago
|
Comment 18•1 years ago
|
||
The implementation in Chrome is already leading to issues for people, it is one the reasons for me to keep using Firefox. I would suggest not to adopt the Chromium-behaviour.
There are valid use cases for using basic auth in iframes. Instead of blocking it, displaying the prompt may be enough.
Comment 19•1 year ago
|
||
I wont be working on this for this month. I will get back to this, once I have some cycles.
Updated•1 year ago
|
Updated•10 months ago
|
Description
•