-
Notifications
You must be signed in to change notification settings - Fork 352
Open
Labels
clarificationStandard could be clearerStandard could be clearertopic: timingIssues and PR that touch on the infrastructure that is used by ResourceTiming, NavigationTiming, etcIssues and PR that touch on the infrastructure that is used by ResourceTiming, NavigationTiming, etc
Description
Redirect tainting is what changes the origin into "null" when there are cross-origin redirects.
It makes sense in places where we deal with credentials & data, mainly to protect against confused deputy.
However, when timing are involved, the confused deputy attack is meaningless. All this does is make it so that an origin cannot read its own timing without TAO
. Since an origin knows its own timing anyway in the server, this protection is mainly a nuisance.
Perhaps there's a valid reason for it that I don't see, and perhaps we want to be careful about removing protections, but in either case it would be nice to spell out what this protects again in some informative note.
Metadata
Metadata
Assignees
Labels
clarificationStandard could be clearerStandard could be clearertopic: timingIssues and PR that touch on the infrastructure that is used by ResourceTiming, NavigationTiming, etcIssues and PR that touch on the infrastructure that is used by ResourceTiming, NavigationTiming, etc