-
Couldn't load subscription status.
- Fork 41
HTTPS considerations. #283
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: gh-pages
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -1669,6 +1669,15 @@ <h2> | |||||
| </li> | ||||||
| </ol> | ||||||
| </li> | ||||||
| <li>If the security properties of <var>newContext</var> are | ||||||
| unsatisfactory (e.g., invalid certificate), then: | ||||||
| <ol> | ||||||
| <li>Reject <var>promise</var> with <a>SecurityError</a>.. | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. editorial: two periods after SecurityError. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
| </li> | ||||||
| <li>Abort these steps. | ||||||
| </li> | ||||||
| </ol> | ||||||
| </li> | ||||||
| <li>Let <var>client</var> be the result of running the | ||||||
| <a data-cite="!SERVICE-WORKERS#create-windowclient-algorithm">create | ||||||
| window client</a> algorithm with <var>newContext</var> as the | ||||||
|
|
@@ -2078,6 +2087,31 @@ <h2> | |||||
| </li> | ||||||
| </ul> | ||||||
| </section> | ||||||
| <section> | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This whole section doesn't feel right in this spec. |
||||||
| <h2> | ||||||
| HTTPS | ||||||
| </h2> | ||||||
| <ul> | ||||||
| <li>The user agent may block mixed content (e.g., non-HTTPS or | ||||||
| scripts) on the payment handler page. | ||||||
| </li> | ||||||
| <li>If the SSL certificate of the payment handler page is not valid | ||||||
| (e.g., self-signed), the user agent may cancel the payment. | ||||||
| </li> | ||||||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think that is inconsistent with the algorithm definition, which forces abort. I suggest changing this to MUST. |
||||||
| <li>If the web-page is known to be malicious (e.g., a phishing page | ||||||
| according to a safe browsing database), the user agent may cancel the | ||||||
| payment. | ||||||
| </li> | ||||||
| <li>If the payment handler page redirects to a non-HTTPS scheme | ||||||
| origin, the user agent should cancel the payment. | ||||||
| </li> | ||||||
| </ul> | ||||||
| <p> | ||||||
| The user agent should provide rationale to the payment handler | ||||||
| developers (e.g., through console messages) and may also inform the | ||||||
| user to help avoid confusion whenever these mitigations happen. | ||||||
| </p> | ||||||
| </section> | ||||||
| </section> | ||||||
| <section id="display" class="informative"> | ||||||
| <h2> | ||||||
|
|
||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems overly vague. Maybe @domenic can suggest better wording for this? It might be a simple as saying "not a secure context" or something link that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It's unclear from @rsolomakhin's text whether insecure HTTP pages are rejected or not. Invalid certificates will fail a navigation, so that would happen before this step.
If the intent is to disallow insecure HTTP, then the wording would be newContext's active document's relevant settings object is contextually secure.