Skip to content

Commit e3aaff3

Browse files
committed
Link to CfC
1 parent 00c558c commit e3aaff3

File tree

2 files changed

+7
-6
lines changed

2 files changed

+7
-6
lines changed

index.bs

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,8 @@ This document will summarize the threat model which the Web Application Security
182182
espouses(?), point to a set of mitigations which seem promising, and provide concrete recommendations
183183
for developers responsible for protecting users' data.
184184

185-
ISSUE: Propose this to WebAppSec.
185+
ISSUE: Proposed to, but not yet accepted by, WebAppSec in
186+
<a href="https://lists.w3.org/Archives/Public/public-webappsec/2021Feb/0007.html">Feb. 2021</a>.
186187

187188
Threat Model {#threat-model}
188189
----------------------------

index.html

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1486,7 +1486,7 @@
14861486
</style>
14871487
<meta content="Bikeshed version c5172e83, updated Fri Nov 20 15:35:20 2020 -0800" name="generator">
14881488
<link href="https://mikewest.github.io/post-spectre-webdev/" rel="canonical">
1489-
<meta content="1ebb4b0e577bdbe3499bc6f59b4dd2c89a0eaa11" name="document-revision">
1489+
<meta content="00c558cd1a8543faf4012f3cbb56d919c955762f" name="document-revision">
14901490
<style>/* style-autolinks */
14911491

14921492
.css.css, .property.property, .descriptor.descriptor {
@@ -2043,7 +2043,7 @@
20432043
<div class="head">
20442044
<p data-fill-with="logo"></p>
20452045
<h1 class="p-name no-ref" id="title">Post-Spectre Web Development</h1>
2046-
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-25">25 February 2021</time></span></h2>
2046+
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-26">26 February 2021</time></span></h2>
20472047
<div data-fill-with="spec-metadata">
20482048
<dl>
20492049
<dt>This version:
@@ -2058,7 +2058,7 @@ <h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="cont
20582058
<div data-fill-with="warning"></div>
20592059
<p class="copyright" data-fill-with="copyright"><a href="http://creativecommons.org/publicdomain/zero/1.0/" rel="license"><img alt="CC0" src="https://licensebuttons.net/p/zero/1.0/80x15.png"></a> To the extent possible under law, the editors have waived all copyright
20602060
and related or neighboring rights to this work.
2061-
In addition, as of 25 February 2021,
2061+
In addition, as of 26 February 2021,
20622062
the editors have made this specification available under the <a href="http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0" rel="license">Open Web Foundation Agreement Version 1.0</a>,
20632063
which is available at http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0.
20642064
Parts of this work may be from another specification document. If so, those parts are instead covered by the license of that specification document. </p>
@@ -2134,7 +2134,7 @@ <h2 class="heading settled" data-level="1" id="intro"><span class="secno">1. </s
21342134
<p>This document will summarize the threat model which the Web Application Security Working group
21352135
espouses(?), point to a set of mitigations which seem promising, and provide concrete recommendations
21362136
for developers responsible for protecting users' data.</p>
2137-
<p class="issue" id="issue-bdf75540"><a class="self-link" href="#issue-bdf75540"></a> Propose this to WebAppSec.</p>
2137+
<p class="issue" id="issue-b2d6f667"><a class="self-link" href="#issue-b2d6f667"></a> Proposed to, but not yet accepted by, WebAppSec in <a href="https://lists.w3.org/Archives/Public/public-webappsec/2021Feb/0007.html">Feb. 2021</a>.</p>
21382138
<h3 class="heading settled" data-level="1.1" id="threat-model"><span class="secno">1.1. </span><span class="content">Threat Model</span><a class="self-link" href="#threat-model"></a></h3>
21392139
<p>Spectre-like side-channel attacks inexorably lead to a model in which active web content
21402140
(JavaScript, WASM, probably CSS if we tried hard enough, and so on) can read any and all data which
@@ -2797,7 +2797,7 @@ <h3 class="no-num no-ref heading settled" id="informative"><span class="content"
27972797
</dl>
27982798
<h2 class="no-num no-ref heading settled" id="issues-index"><span class="content">Issues Index</span><a class="self-link" href="#issues-index"></a></h2>
27992799
<div style="counter-reset:issue">
2800-
<div class="issue"> Propose this to WebAppSec.<a href="#issue-bdf75540"></a></div>
2800+
<div class="issue"> Proposed to, but not yet accepted by, WebAppSec in <a href="https://lists.w3.org/Archives/Public/public-webappsec/2021Feb/0007.html">Feb. 2021</a>.<a href="#issue-b2d6f667"></a></div>
28012801
<div class="issue"> <a data-link-type="biblio" href="#biblio-coi-threat-model">[COI-THREAT-MODEL]</a> spells out more implications. Bring them in here for more nuance.<a href="#issue-340f57a5"></a></div>
28022802
<div class="issue"> Describe these mitigations in more depth, swiping liberally from <a href="https://docs.google.com/document/d/1JBUaX1xSOZRxBk5bRNZWgnzyJoCQC52TIRokACBSmGc/edit?resourcekey=0-cZ7da6v52enjwRSsp_tLyQ">Notes on the threat model of <em>cross-origin isolation</em></a>, <a href="https://docs.google.com/document/d/1zDlfvfTJ_9e8Jdc8ehuV4zMEu9ySMCiTGMS9y0GU92k/edit">Safely reviving shared memory</a>, etc.<a href="#issue-db0b0c7b"></a></div>
28032803
<div class="issue"> If we implemented more granular bindings for CORP headers (along

0 commit comments

Comments
 (0)