-
Notifications
You must be signed in to change notification settings - Fork 41
Add [gateway.]ipfs.io to public suffix list #83
Comments
I've never even heard of the Public Suffix List to be honest, but it makes sense -- thanks for the suggestion! We actually want to sandbox every object on ipfs.io and gateway.ipfsio as much as possible. I think we can't even cleanly give a child object access to its parent's cookies/localstorage/etc. For (sub)domains which don't expose /ipfs or /ipns, it'll be a bit cleaner. There are non so far, but we'll have dist.ipfs.io and another soon. |
@willglynn oh this is great! thanks! i wasn't aware of this list either, though in retrospect it makes perfect sense.
yep!
that would make it very difficult to make webapps. i think sandboxing "per-root" is probably ok. there probably are ways of "including the object in question" as your own child to get it to set cookies or something, but i think things may just have to start doing detection on the root of the path. ideally, this is would be treated as but again, im not sure about any of this yet. we need careful study of all the security implications.
I think it should be:
hshca-style subdomains should be able to set cookies on themselves though. if anything. though i wonder about the implications of saying "no cookies" altogether. i mean, ideally, this would merge sooner. maybe we can talk to that group and help push it fwd. TBL himself recently talked about this. Actually, PPSO is implemented already, just not merged it looks like: https://code.google.com/p/chromium/issues/detail?id=336894 |
I've begun this process: publicsuffix/list#766 After talking with @lgierth, I've used |
Closing as complete. Thanks to @willglynn for starting this conversation. |
The Public Suffix List is used to determine administrative boundaries – that is, which part of a domain name is shared and which part is not. These boundaries are irregular and often have security implications. For example,
a.foo.com
should be permitted to set a cookie forfoo.com
, whilea.co.uk
should not be permitted to set a cookie forco.uk
.Besides top-level domains, the public suffix list includes a number of private domains that warrant similar treatment:
I'm not sure what the desired policy is but something relating to
ipfs.io
should be listed here. Specifically, I think the resulting rule(s) should at least prevent cookies from being set forgateway.ipfs.io
, as well as any subdomains (#81).The text was updated successfully, but these errors were encountered: