Skip to content

Consider if redirect tainting should apply to Timing-Allow-Origin #1484

@noamr

Description

@noamr

Redirect tainting is what changes the origin into "null" when there are cross-origin redirects.
It makes sense in places where we deal with credentials & data, mainly to protect against confused deputy.

However, when timing are involved, the confused deputy attack is meaningless. All this does is make it so that an origin cannot read its own timing without TAO. Since an origin knows its own timing anyway in the server, this protection is mainly a nuisance.
Perhaps there's a valid reason for it that I don't see, and perhaps we want to be careful about removing protections, but in either case it would be nice to spell out what this protects again in some informative note.

Metadata

Metadata

Assignees

No one assigned

    Labels

    clarificationStandard could be clearertopic: timingIssues and PR that touch on the infrastructure that is used by ResourceTiming, NavigationTiming, etc

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions