-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TPAC 2019 Agenda. #555
Comments
Ideas:
|
@annevk: Added those in, thank you! |
Is there enough time to briefly chat about a new Sec-Origin header we've been working on? |
Too early to talk about First-Party Sets?
I'm not sure how detailed discussions get at TPAC, but I'd like to highlight Cookie control, if I may.
As a developer I find sandboxing difficult. Either I'll restrict essential features due to lack of documentation from service providers, or take the safe route and restrict a very minimal set of features (or not use |
Added it to the list. Will you be attending in person, or do we need to find a California-friendly time for you to dial in? Also, is there an explainer document we could link to so folks are up to speed on the proposal when we discuss it?
Added.
I think it's generally the case that a frame-to-be-sandboxed needs to cooperate with its sandboxer if breakage is to be avoided. Just applying unexpected restrictions is unlikely to be effective, as you note. What do you think this group can do to improve that situation? Where would you like the conversation at TPAC to focus? |
I'm interested in CSP Next and also in the security reviews for other W3C projects/features, but I won't be at TPAC. California-friendly times would cover me, and I'll likely be able to shift my schedule later to get more overlap. |
@johnwilander is there a pre-read for Login API? |
@hillbrad, not yet. I hope to publish an explainer of some sort. |
Can we discuss an Origin Policy for opting in to Origin Isolation? We will have an explainer we can share before the end of this week. |
Re: #555 (comment), there have been a number of different proposals for isolating documents from each other -- this proposal with origin policy, a couple of different feature policy features, 'domain' in sandbox, and probably a couple of other ideas around agent cluster isolation. I don't think it's spefically within the charter, but is a general discussion around that problems space in scope for this group? |
Web2App access is a popular topic outside of the W3C: |
As part of the FeaturePolicy discussion, would also be great to talk about support for markup based FP declaration. |
The agenda seems pretty full by now, but it could be interesting to spend a few minutes talking about how we could make the platform safe (or, safer) by default for new applications. That is, now that we have mostly coherent proposals for preventing injections (CSP3/Next + Trusted Types) and locking down cross-origin interactions (COOP, CORP, Fetch Metadata), and we're making progress on Origin Policy, could we bundle them together with a simple origin-wide opt-in? If so, can we even go a step further and enable this by default in some cases? (learning from the successes & mistakes of the HSTS preload list) |
I noticed September 17 clashes with Web Components. Not really sure how to deal with that, but maybe leave some stuff for September 19? |
I imagine this issue can be closed now. Is there any plan for WebAppSec to meet at TPAC 2020? I don't see the group listed on the group schedule page. |
Suggestions or thoughts about topics we should discuss at TPAC? This would be a lovely place to put them.
IsLoggedIn
API (@johnwilander)Sec-Origin
(@deian)The text was updated successfully, but these errors were encountered: