-
Notifications
You must be signed in to change notification settings - Fork 3.1k
Closed
Labels
security/privacyThere are security or privacy implicationsThere are security or privacy implicationstopic: cross-origin-opener-policyIssues and ideas around the new "inverse of rel=noopener" headerIssues and ideas around the new "inverse of rel=noopener" header
Description
Any origin served with CSP sandbox (without allow-same-origin) will have opaque origin. But until that response header comes back, browser would not know its origin.
We should probably treat CSP sandboxed page as cross-origin even though the tuple of scheme, host, and port would match. But is it same-site or cross-site?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
security/privacyThere are security or privacy implicationsThere are security or privacy implicationstopic: cross-origin-opener-policyIssues and ideas around the new "inverse of rel=noopener" headerIssues and ideas around the new "inverse of rel=noopener" header