<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://www.w3.org/Bugs/Public/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://www.w3.org/Bugs/Public/"
          
          maintainer="sysbot+bugzilla@w3.org"
>

    <bug>
          <bug_id>12744</bug_id>
          
          <creation_ts>2011-05-25 00:10:40 +0000</creation_ts>
          <short_desc>The crossdomain attribute named as such may prove an attractive talisman for copy-paste/cargocult authors, such that they start applying it on _any_ out of domain img regardless of CORS, especially when they see the no attribute string form &lt;img crossdoma</short_desc>
          <delta_ts>2011-08-31 23:50:42 +0000</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>HTML WG</product>
          <component>LC1 HTML5 spec</component>
          <version>unspecified</version>
          <rep_platform>Other</rep_platform>
          <op_sys>other</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>NEEDSINFO</resolution>
          
          
          <bug_file_loc>http://www.whatwg.org/specs/web-apps/current-work/#attr-img-crossorigin</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter>contributor</reporter>
          <assigned_to name="Ian &apos;Hixie&apos; Hickson">ian</assigned_to>
          <cc>annevk</cc>
    
    <cc>ayg</cc>
    
    <cc>ian</cc>
    
    <cc>julian.reschke</cc>
    
    <cc>mike</cc>
    
    <cc>public-html-admin</cc>
    
    <cc>public-html-wg-issue-tracking</cc>
          
          <qa_contact name="HTML WG Bugzilla archive list">public-html-bugzilla</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>48759</commentid>
    <comment_count>0</comment_count>
    <who name="">contributor</who>
    <bug_when>2011-05-25 00:10:40 +0000</bug_when>
    <thetext>Specification: http://www.whatwg.org/specs/web-apps/current-work/multipage/embedded-content-1.html
Section: http://www.whatwg.org/specs/web-apps/current-work/#attr-img-crossorigin

Comment:
The crossdomain attribute named as such may prove an attractive talisman for
copy-paste/cargocult authors, such that they start applying it on _any_ out of
domain img regardless of CORS, especially when they see the no attribute
string form &lt;img crossdomain src=&quot;...&quot; /&gt; which doesn&apos;t give the author any
semantic clue as to its real purpose.  Adding this attribute might not cause
visible breakage (if whoever is serving the image supports CORS), but it does
change the security attack surface of the application and should not be done
without reason.  Perhaps change the name of the attribute to something that
would not tempt authors to use it outside of CORS scenerios.  (Submitted by
Christian Iivari)

Posted from: 173.72.153.184
User agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>48843</commentid>
    <comment_count>1</comment_count>
    <who name="Simon Pieters">zcorpan</who>
    <bug_when>2011-05-26 10:39:31 +0000</bug_when>
    <thetext>The use cases are for painting on 2d canvas and reading back the result or painting on webgl canvas. Is there a need for a declarative attribute, or should this feature only be available to scripts?</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>53871</commentid>
    <comment_count>2</comment_count>
    <who name="Michael[tm] Smith">mike</who>
    <bug_when>2011-08-04 05:34:02 +0000</bug_when>
    <thetext>mass-move component to LC1</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>55206</commentid>
    <comment_count>3</comment_count>
    <who name="Anne">annevk</who>
    <bug_when>2011-08-16 08:42:33 +0000</bug_when>
    <thetext>Could create XMLHttpRequest.responseType = &quot;image&quot;. (Just a thought.)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>56135</commentid>
    <comment_count>4</comment_count>
    <who name="Ian &apos;Hixie&apos; Hickson">ian</who>
    <bug_when>2011-08-31 23:50:42 +0000</bug_when>
    <thetext>EDITOR&apos;S RESPONSE: This is an Editor&apos;s Response to your comment. If you are satisfied with this response, please change the state of this bug to CLOSED. If you have additional information and would like the editor to reconsider, please reopen this bug. If you would like to escalate the issue to the full HTML Working Group, please add the TrackerRequest keyword to this bug, and suggest title and text for the tracker issue; or you may create a tracker issue yourself, if you are able to do so. For more details, see this document:
   http://dev.w3.org/html5/decision-policy/decision-policy.html

Status: Did Not Understand Request
Change Description: no spec change
Rationale: What&apos;s the attack scenario here? I would have set it implicitly on all &lt;img&gt; elements if it wasn&apos;t for compatibility concerns, so I don&apos;t understand why it would be bad for people to set it. In fact if anything, &lt;img crossdomain src=&quot;...&quot;&gt; is safer than &lt;img src=&quot;...&quot;&gt; since it removes cookies from the request.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>