Restrict the ability to navigate the top level context to content that is processing a user gesture, unless it is same-origin to the parent |
||||||||||||
Issue descriptionChange description: Summary Content in an <iframe> can generally navigate the top level browsing context unless explicitly forbidden by the sandbox attribute (sometimes called 'framebusting'). Restrict this ability to content that is processing a user gesture, unless it is same-origin to the parent. Motivation Framebusting was originally used by content that wanted to prevent being placed in an <iframe>. However, there are other, more specific tools to accomplish this (see section below). On the other hand, this framebusting technique is being used by malicious content to forcibly navigate the user. Changes to API surface: Restrict framebusting ability to content that is processing a user gesture, unless it is same-origin to the parent. Links: Public standards discussion: https://github.com/WICG/interventions/issues/16 Support in other browsers: Internet Explorer: no Firefox: no Safari: no
,
Oct 6 2016
,
Oct 14 2016
Removing milestone while we figure out how to deal with the unexpected breakage.
,
Jan 4 2017
This is currently enabled in M56 and will hit stable in a couple weeks (even though the bugs are still marked open and the chromestatus entry says in development: https://www.chromestatus.com/features/5851021045661696), right? I'm seeing a lot of recent reports of breakage on the issue: https://github.com/WICG/interventions/issues/16. What do the latest UMA stats say about the compat impact? Have we written any blog entries or done any other sort of outreach?
,
Jan 4 2017
For context, the intent to ship discussion was here: https://groups.google.com/a/chromium.org/forum/#!msg/blink-dev/Xi8-y4ySjA4/Eb1sBWH8BQAJ
,
Jan 11 2017
Apologies for the delay. Status: reverting for M56, given the breakage. Aiming at a narrower version for M57.
,
Feb 12 2017
see b/34983924
,
Feb 14 2017
Ownership transfer.
,
Feb 15 2017
,
Mar 28 2017
What changed with this now in M57? M56 worked with VMware vSphere 6.5 Enhanced Authentication Plugin, now it's broken ... tried disabling Framebusting flag in M57 but doesn't help. Error I see from the vCenter's login page in Chrome Console (censored hostname, but its a different host than the website serving up the page):
Uncaught DOMException: Failed to execute 'assign' on 'Location': Blocked a frame with origin "https://XXX" from accessing a cross-origin frame.
at ApiConnection.__startProtocolServer__ (https://XXX/websso/resources/js/assets/csd_api_connection.js:212:23)
at ApiConnection.__callStartProtocolServer__ (https://XXX/websso/resources/js/assets/csd_api_connection.js:194:12)
at ApiConnection.__on_lookup_connected__ (https://XXX/websso/resources/js/assets/csd_api_connection.js:180:15)
at WebSocket.socket.onopen (https://XXX/websso/resources/js/assets/csd_api_connection.js:124:16)
,
Mar 28 2017
@arrons, We've reverted this change in Chrome 57 (See https://github.com/WICG/interventions/issues/16#issuecomment-288801751), and it seems the breakage you mentioned is unrelated to this change.
,
Mar 28 2017
,
Aug 7 2017
Hi, today I saw a warning about this in the Chrome console. Enabling the feature in labs it's breaking our authentication system. Is this moving forward? I'm also following the issue in GitHub and I did not see any movement recently.
,
Aug 7 2017
We're hooking it up to the same UI as we use for popup-blocking so that, if there is content that can't be updated, users can still get to the next page. Once we get that completed, we're planning to try shipping it again. Unfortunately, that won't help with lab-testing cases. rbyers/dknox: Any thoughts on what we should do when a behavior makes sense except in the lab? What's our solution for other scenarios like this?
,
Aug 8 2017
Thank you, Ojan. Is there any ETA?
,
Sep 12 2017
This issue has been automatically relabelled type=task because type=launch-owp issues are now officially deprecated. The deprecation is because they were creating confusion about how to get launch approvals, which should be instead done via type=launch issues. We recommend this issue be used for implementation tracking (for public visibility), but if you already have an issue for that, you may mark this as duplicate. For more details see here: https://docs.google.com/document/d/1JA6RohjtZQc26bTrGoIE_bSXGXUDQz8vc6G0n_sZJ2o/edit For any questions, please contact owencm, sshruthi, larforge
,
May 8 2018
,
May 16 2018
The blog entry for this says it was happening in 64, and chromestatus says 65, but it doesn't look like it's enabled yet (it's still off by default in the code, I can't find an experiment referring to it, and testing it seems like it's still permitted). What's the current status of this? We're potentially interested in enabling this or something similar for WebView and want to know what the current status for Chrome is.
,
May 16 2018
,
Sep 11
|
||||||||||||
►
Sign in to add a comment |
||||||||||||
Comment 1 by kenjibaheux@chromium.org
, Aug 23 2016