Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can COWL be useful for ths use case? #1

Closed
deian opened this issue Jan 16, 2020 · 3 comments
Closed

Can COWL be useful for ths use case? #1

deian opened this issue Jan 16, 2020 · 3 comments

Comments

@deian
Copy link

deian commented Jan 16, 2020

Nice! Out of curiosity, have you considered using a more general mechanism like COWL for some of this? For example the opaque iframes can be implemented pretty easily using labeled iframes. I think some of the examples we describe can be retrofitted for this use case (while providing a more general mechanism beyond ads for web developers).

@deian deian changed the title Have you looked at COWL? Can COWL be useful for ths use case? Jan 16, 2020
@michaelkleber
Copy link
Collaborator

Thanks for the pointer! TURTLEDOVE is one of several recent proposals that would need some sort of more-restricted way of embedding content. We'll need to clearly spell out the restrictions demanded by the various use cases, and it would be great if existing work can meet all or some of them.

That said, the COWL threat model is quite clear that

COWL is intended to be used as a defense-in-depth mechanism that can restrict how untrusted—buggy but not malicious—code handles sensitive data. Given the complexities of browser implementations and the presence of covert channels, malicious code may be able to exfiltrate data.

The threat model here must explicitly target the malicious sharing case: the very same ad network may be running script in the top-level page (which knows the first-party user identity) and inside the ad (which knows the interest group), and that ad network might very much want to join up those pieces of information.

@deian
Copy link
Author

deian commented Jan 22, 2020

The restricted thread model is from a while back, before browser folks were willing to put iframes into separate processes. And we have formal proofs showing that you can actually provide confidentiality in the presence of malicious code if you're willing to use a separate thread.

@JensenPaul
Copy link
Collaborator

Closing this issue as it represents past design discussion that predates more recent proposals. I believe some of this feedback was incorporated into the Fenced Frames proposal. If you feel further discussion is needed, please feel free to reopen this issue or file a new issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants