Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-25 Thread Gabriel Corona
Hi, > 1. Introduce an "untrusted" mode or flag in browser CLI tools for > opening external URLs > 2. Extend xdg-open to support passing this "untrusted" flag or context > to the browser > 3. Modify desktop environments or applications to invoke xdg-open with > the "untrusted" option when appropri

Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-25 Thread Simon McVittie
On Mon, 23 Jun 2025 at 20:59:46 +0900, grape mingijung wrote: During discussions with several Linux distro security teams, the following suggestions were raised: 1. Introduce an "untrusted" mode or flag in browser CLI tools for opening external URLs 2. Extend xdg-open to support passing th

Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-24 Thread Lucas Holt
On 6/24/25 4:22 PM, Gabriel Corona wrote: As was said by Solar Designer, if a "safe" version is needed, it should probably be the default when going through URI scheme registrations. This is because, as you said, this kind of issue lies in the interaction between several components (URI sources

Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-24 Thread Anton Luka Šijanec
Hi! Simon McVittie je 24. 6. 25 ob 11:43 napisal: How does this work on other platforms like Windows and macOS? On Windows, the implementation details are different, but the general "shape" of the API seems like it's the same: the URL handler registers itself with the system by saying "I can h

Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-24 Thread grape mingijung
Hello, Thank you again for your continued attention to this topic. With respect to sending SameSite=Strict cookies in CLI-initiated navigations, it seems that different browsers may take slightly different approaches to this issue. Because of that, it’s hard to predict how things will develop goi

Re: [oss-security] xdg-open bypassing SameSite=Strict

2025-06-23 Thread Solar Designer
Hello Mingi Jung, Thank you for your report and handling of this issue. On Mon, Jun 23, 2025 at 08:59:46PM +0900, grape mingijung wrote: > During discussions with several Linux distro security teams, the following > suggestions were raised: > >1. Introduce an "untrusted" mode or flag in brow