> If apps are served from and signed by the marketplace, then any origin is 
> okay (after
> review.)

I know that we rely on code review for a lot of security assurance
questions, but it seems to me that allowing /any origin/ opens us up
to attacks needlessly.

Could we allow any out of a whitelist of origins specified in the
manifest, instead?

On Thu, Apr 25, 2013 at 8:34 PM, Ben Adida <[email protected]> wrote:
>
> Hi folks,
>
> I want to raise what I believe is a relatively urgent issue with packaged
> apps and web origins:
>
>   https://bugzilla.mozilla.org/show_bug.cgi?id=852720
>
> Currently, packaged apps run in an origin that is newly minted for each
> device installation, effectively a GUID that differs from device to device.
> This works up until the point where the rest of the Web expects a stable
> origin across devices, e.g. OAuth and OpenID flows, and Persona. Since
> origins are so critical to the Web, I expect to see many more failures over
> time.
>
> Can we fix this?
>
> Potch has a great proposal: let apps declare a marketplace in their
> manifest. If apps are served from and signed by the marketplace, then any
> origin is okay (after review.) If apps are self-hosted, then the only origin
> allowed is that of the hosting site.
>
> I suggested a tweak to this: if a packaged app is served from
> https://example.com, then it can set an origin of app://example.com, so that
> it is stable but also different from the actual hosted origin.
>
> Can we converge on a solution here ASAP? This is now holding up making
> Marketplace a packaged app, and I suspect it will bite us again soon.
>
> -Ben
> _______________________________________________
> dev-platform mailing list
> [email protected]
> https://lists.mozilla.org/listinfo/dev-platform
_______________________________________________
dev-platform mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to