Skip to content

Commit eea6a15

Browse files
committed
s/hardware-level/OS-level/. Closes w3c#5.
1 parent 65262d0 commit eea6a15

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

index.bs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ Introduction {#intro}
148148

149149
In early 2018, Spectre made it clear that a foundational security boundary the web aimed to
150150
maintain was substantially less robust than expected. [[SPECTRE]] This revelation has pushed web
151-
browsers to shift their focus from the platform-level [=origin=] boundary to a hardware-level
151+
browsers to shift their focus from the platform-level [=origin=] boundary to an OS-level
152152
process boundary. Chromium's threat model, for instance, now asserts that "active web content …
153153
will be able to read any and all data in the address space of the process that hosts it".
154154
[[POST-SPECTRE-RETHINK]] This shift in thinking imposes a shift in development practice, both
@@ -174,7 +174,7 @@ Spectre-like side-channel attacks inexorably lead to a model in which active web
174174
has entered the address space of the process which hosts it. While this has deep implications for
175175
user agent implementations' internal hardening strategies (stack canaries, ASLR, etc), here we'll
176176
remain focused on the core implication at the web platform level, which is both simple and profound:
177-
any data which flows into an origin's process is legible to that origin. We m)ust design accordingly.
177+
any data which flows into an origin's process is legible to that origin. We must design accordingly.
178178

179179
In order to determine the scope of data that can be assumed accessible to an attacker, we must make
180180
a few assumptions about the normally-not-web-exposed process model which the user agent implements.

index.html

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1486,7 +1486,7 @@
14861486
</style>
14871487
<meta content="Bikeshed version c5172e83, updated Fri Nov 20 15:35:20 2020 -0800" name="generator">
14881488
<link href="https://mikewest.github.io/post-spectre-webdev/" rel="canonical">
1489-
<meta content="b5540d7b5844f99a1e1011bcfe25f082a9df641c" name="document-revision">
1489+
<meta content="65262d0a128165f7a5deaa06308476effff82a10" name="document-revision">
14901490
<style>/* style-autolinks */
14911491

14921492
.css.css, .property.property, .descriptor.descriptor {
@@ -2043,7 +2043,7 @@
20432043
<div class="head">
20442044
<p data-fill-with="logo"></p>
20452045
<h1 class="p-name no-ref" id="title">Post-Spectre Web Development</h1>
2046-
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-18">18 February 2021</time></span></h2>
2046+
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">A Collection of Interesting Ideas, <time class="dt-updated" datetime="2021-02-22">22 February 2021</time></span></h2>
20472047
<div data-fill-with="spec-metadata">
20482048
<dl>
20492049
<dt>This version:
@@ -2058,7 +2058,7 @@ <h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="cont
20582058
<div data-fill-with="warning"></div>
20592059
<p class="copyright" data-fill-with="copyright"><a href="http://creativecommons.org/publicdomain/zero/1.0/" rel="license"><img alt="CC0" src="https://licensebuttons.net/p/zero/1.0/80x15.png"></a> To the extent possible under law, the editors have waived all copyright
20602060
and related or neighboring rights to this work.
2061-
In addition, as of 18 February 2021,
2061+
In addition, as of 22 February 2021,
20622062
the editors have made this specification available under the <a href="http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0" rel="license">Open Web Foundation Agreement Version 1.0</a>,
20632063
which is available at http://www.openwebfoundation.org/legal/the-owf-1-0-agreements/owfa-1-0.
20642064
Parts of this work may be from another specification document. If so, those parts are instead covered by the license of that specification document. </p>
@@ -2117,7 +2117,7 @@ <h2 class="no-num no-toc no-ref" id="contents">Table of Contents</h2>
21172117
<h2 class="heading settled" data-level="1" id="intro"><span class="secno">1. </span><span class="content">Introduction</span><a class="self-link" href="#intro"></a></h2>
21182118
<p>In early 2018, Spectre made it clear that a foundational security boundary the web aimed to
21192119
maintain was substantially less robust than expected. <a data-link-type="biblio" href="#biblio-spectre">[SPECTRE]</a> This revelation has pushed web
2120-
browsers to shift their focus from the platform-level <a data-link-type="dfn" href="https://html.spec.whatwg.org/multipage/origin.html#concept-origin" id="ref-for-concept-origin">origin</a> boundary to a hardware-level
2120+
browsers to shift their focus from the platform-level <a data-link-type="dfn" href="https://html.spec.whatwg.org/multipage/origin.html#concept-origin" id="ref-for-concept-origin">origin</a> boundary to an OS-level
21212121
process boundary. Chromium’s threat model, for instance, now asserts that "active web content …
21222122
will be able to read any and all data in the address space of the process that hosts it". <a data-link-type="biblio" href="#biblio-post-spectre-rethink">[POST-SPECTRE-RETHINK]</a> This shift in thinking imposes a shift in development practice, both
21232123
for browser vendors, and for web developers. Browsers need to align the origin boundary with the
@@ -2136,7 +2136,7 @@ <h3 class="heading settled" data-level="1.1" id="threat-model"><span class="secn
21362136
has entered the address space of the process which hosts it. While this has deep implications for
21372137
user agent implementations' internal hardening strategies (stack canaries, ASLR, etc), here we’ll
21382138
remain focused on the core implication at the web platform level, which is both simple and profound:
2139-
any data which flows into an origin’s process is legible to that origin. We m)ust design accordingly.</p>
2139+
any data which flows into an origin’s process is legible to that origin. We must design accordingly.</p>
21402140
<p>In order to determine the scope of data that can be assumed accessible to an attacker, we must make
21412141
a few assumptions about the normally-not-web-exposed process model which the user agent implements.
21422142
The following seems like a good place to start:</p>

0 commit comments

Comments
 (0)