Is the threat model for all of these permissions significant enough to warrant 
the breakage? Popups for example are annoying, but a spoofed origin to take 
advantage of whitelisted popups seems not terribly dangerous.

Thanks,

Andreas

> On Mar 6, 2015, at 5:27 PM, Anne van Kesteren <ann...@annevk.nl> wrote:
> 
> A large number of permissions we currently allow users to store
> persistently for a given origin. I suggest we stop offering that
> functionality when there's no lock in the address bar. This will make
> it harder for a network attacker to abuse these permissions. This
> would affect UX for:
> 
> * Geolocation
> * Notification
> * Fullscreen
> * Pointer Lock
> * Popups
> 
> If you are interested in demos of how these function today:
> 
> * http://dontcallmedom.github.io/web-permissions-req/tests/geo-get.html
> * http://dontcallmedom.github.io/web-permissions-req/tests/notification.html
> * http://dontcallmedom.github.io/web-permissions-req/tests/fullscreen.html
> * http://dontcallmedom.github.io/web-permissions-req/tests/pointerlock.html
> * http://dontcallmedom.github.io/web-permissions-req/tests/popup.html
> 
> Note that we have already implemented this for getUserMedia(). You can
> contrast the UX for these two links:
> 
> * http://dontcallmedom.github.io/web-permissions-req/tests/gum-audiovideo.html
> * 
> https://dontcallmedom.github.io/web-permissions-req/tests/gum-audiovideo.html
> 
> This seems like a change we can make today that would be better for
> our users and nudge those that require persistence to do the right
> thing, without causing much harm.
> 
> 
> -- 
> https://annevankesteren.nl/
> _______________________________________________
> firefox-dev mailing list
> firefox-...@mozilla.org
> https://mail.mozilla.org/listinfo/firefox-dev

_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to