-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sec-Fetch-Ancestors
?
#56
Comments
That is, A nested in A would send the following when making a request to A: |
(Note that this is somewhat similar to @deian, et al's |
Precedent in naming: I would expect |
Sure: |
I'd love to see this! |
Sounds reasonable to me as well. I like the consistency with @mikewest For a top-level navigation, would it make sense to set
I haven't really thought this through, and perhaps we're already getting most of this information from |
Hrm. I started typing something else, but this might actually be a reasonable proposal... It would match CSP's semantic of |
+1 I like the idea and how well it fits into existing semantics of CSP and SameSite cookies. |
w3c/webappsec-fetch-metadata#56 Change-Id: I91e072ddd777150c973ad24f3f729cb2fd979232
This patch aims to formalize the discussion from #56, defining a `Sec-Fetch-Frame-Ancestors` header that supplements `Sec-Fetch-Site`'s exposure of the relationship between a request's initiator and the request's target with additional context about the same-siteness of context within which the request was made. This should support developers' understanding of the viability of various `SameSite` cookie settings on the one hand, and the ways in which their resources are partitioned on the other.
I started poking at this again between meetings over the last few weeks. I still think it's a reasonable thing to add to the platform, and it seems to be more interesting to more developers these days given the partitioning story for storage, etc. I took a stab at one formulation of details in #89. I'd appreciate thoughts there about how we should handle various cases (top-level navigations stand out, but there are likely other interesting edges to test). |
@davidben pointed out that we made a decision in Fetch Metadata to send the site-relationship between the initiator and the target in
Sec-Fetch-Site
, which doesn't allow servers to make the same decisions as we make withSameSite
cookies, which send the relationship between the initiator and all its ancestors and the target. Perhaps we should add another header containing this relationship, which would allow servers to unifiy the declarative logic ofSameSite
with server-side logic around other characteristics of a request?/cc @arturjanc @lweichselbaum @ckerschb WDYT?
The text was updated successfully, but these errors were encountered: