Hi all,

sorry for the late answer, a flu and some other duties kept me from answering so far.

I agree with Thomas, Adam and David, so please go ahead with the webappsecwg charter.

The current plan for #3 is to be adopted in websec (as http headers should be done in IETF) and proceed within a few months to RFC. (main idea is to progress the adopted X-Frame-Options to standard and enhance where necessary).

A conflict with current CSP would be bad, but as Adam said, I agree that it might be kept outside of CSP and progress normally in websec.

Kind regards, Tobias


On 12/07/11 20:07, Thomas Roessler wrote:
So, looking at this thread, here's what I suggest for the webappsecwg charter: We keep 
the deliverable in there, but make it very clear that the group should liaise 
particularly closely with websec "and other IETF work around framing policy" 
(or some such), explicitly to avoid conflicting or competing specifications.

That way, if the vision of complementary specs that Brad describes 
materializes, we have the necessary charter coverage, but we're very clear that 
other work is going on and should be respected.

If that's ok with everybody, I'll make the tweak before we send this to the 
membership.

--
Thomas Roessler, W3C<t...@w3.org>   (@roessler)







On Jul 8, 2011, at 01:07 , David Ross wrote:

#3 is a narrowly scoped effort to standardize something that works pretty well 
today in practice (X-FRAME-OPTIONS).  A conflict with CSP would be bad, but per 
Adam it seems like overlap is looking less likely.  So proceeding down the 
current path on #3 sounds good to me.

David Ross
dr...@microsoft.com


-----Original Message-----
From: Adam Barth [mailto:w...@adambarth.com]
Sent: Thursday, July 07, 2011 3:24 PM
To: Thomas Roessler
Cc: Tobias Gondrom; Arthur Barstow; Brad Hill; Eric Rescorla; Alexey Melnikov; 
David Ross; Anne van Kesteren; Adrian Bateman; Brandon Sterne; Charles 
McCathieNevile; Maciej Stachowiak; Peter Saint-Andre; Michael(tm) Smith; Mark 
Nottingham; Jeff Hodges; public-web-secur...@w3.org; public-webapps@w3.org; 
web...@ietf.org
Subject: Re: Frame embedding: One problem, three possible specs?

My sense from talking with folks is that there isn't a lot of enthusiasm for 
supporting this use case in CSP at the present time.
We're trying to concentrate on a core set of directives for the first 
iteration.  If it helps reduce complexity, you might consider dropping option 
(1) for the time being.

Adam


On Thu, Jul 7, 2011 at 2:11 PM, Thomas Roessler<t...@w3.org>  wrote:
(Warning, this is cross-posted widely. One of the lists is the IETF
websec mailing list, to which the IETF NOTE WELL applies:
http://www.ietf.org/about/note-well.html)


Folks,

there appear to be at least three possible specifications addressing this 
space, with similar but different designs:

1. A proposed deliverable in the WebAppSec group to take up on X-Frame-Options 
and express those in CSP:
  http://www.w3.org/2011/07/appsecwg-charter.html

(We expect that this charter might go to the W3C AC for review as soon
as next week.)

2. The "From-Origin" draft (aka "Cross-Origin Resource Embedding Exclusion") 
currently considered for publication as an FPWD in the Webapps WG:

http://lists.w3.org/Archives/Public/public-webapps/2011JulSep/0088.htm
l

This draft mentions integration into CSP as a possible path forward.

3. draft-gondrom-frame-options, an individual I-D mentioned to websec:
  https://datatracker.ietf.org/doc/draft-gondrom-frame-options/
  http://www.ietf.org/mail-archive/web/websec/current/msg00388.html


How do we go about it?  One path forward might be to just proceed as currently 
planned and coordinate when webappsec starts working.

Another path forward might be to see whether we can agree now on what forum to 
take these things forward in (and what the coordination dance might look like).

Thoughts welcome.

Regards,
--
Thomas Roessler, W3C<t...@w3.org>   (@roessler)








Reply via email to