Skip to content

Commit

Permalink
Add notes about non-normativity. (#655)
Browse files Browse the repository at this point in the history
Several "authoring considerations" sections should have been marked non-normative,
as noted in #653. This PR addresses that oversight.
  • Loading branch information
mikewest authored Apr 12, 2024
1 parent f17c7b4 commit d091bce
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions index.bs
Original file line number Diff line number Diff line change
Expand Up @@ -4768,6 +4768,8 @@ this algorithm returns normally if compilation is allowed, and throws a
Usage of "`'strict-dynamic'`"
</h3>

<em>This section is not normative.</em>

Host- and path-based policies are tough to get right, especially on sprawling origins like CDNs.
The <a href="https://github.com/cure53/XSSChallengeWiki/wiki/H5SC-Minichallenge-3:-%22Sh*t,-it%27s-CSP!%22#107-bytes">solutions
to Cure53's H5SC Minichallenge 3: "Sh*t, it's CSP!"</a> [[H5SC3]] are good examples of the
Expand Down Expand Up @@ -4896,6 +4898,8 @@ this algorithm returns normally if compilation is allowed, and throws a
Allowing external JavaScript via hashes
</h3>

<em>This section is not normative.</em>

In [[CSP2]], hash <a>source expressions</a> could only match inlined
script, but now that Subresource Integrity [[SRI]] is widely deployed,
we can expand the scope to enable externalized JavaScript as well.
Expand Down Expand Up @@ -4960,6 +4964,8 @@ this algorithm returns normally if compilation is allowed, and throws a
Strict CSP
</h3>

<em>This section is not normative.</em>

Deployment of an effective CSP against XSS is a challenge (as described in
<a href="https://dl.acm.org/doi/10.1145/2976749.2978363">CSP Is Dead, Long
Live CSP!</a> [[LONG-LIVE-CSP]]). However, enforcing the following set of CSP
Expand Down Expand Up @@ -5000,6 +5006,8 @@ this algorithm returns normally if compilation is allowed, and throws a
Exfiltration
</h3>

<em>This section is not normative.</em>

Data exfiltration can occur when the contents of the request, such as the URL, contain
information about the user or page that should be restricted and not shared.

Expand Down

0 comments on commit d091bce

Please sign in to comment.