<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://www.w3.org/Bugs/Public/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4"
          urlbase="https://www.w3.org/Bugs/Public/"
          
          maintainer="sysbot+bugzilla@w3.org"
>

    <bug>
          <bug_id>13230</bug_id>
          
          <creation_ts>2011-07-13 06:27:06 +0000</creation_ts>
          <short_desc>Remove text/html-sandboxed</short_desc>
          <delta_ts>2011-08-10 01:57:26 +0000</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>HTML WG</product>
          <component>LC1 HTML5 spec</component>
          <version>unspecified</version>
          <rep_platform>Other</rep_platform>
          <op_sys>other</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>WONTFIX</resolution>
          
          
          <bug_file_loc>http://www.whatwg.org/specs/web-apps/current-work/#text/html-sandboxed</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P3</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter>contributor</reporter>
          <assigned_to name="Ian &apos;Hixie&apos; Hickson">ian</assigned_to>
          <cc>annevk</cc>
    
    <cc>bugmail</cc>
    
    <cc>ian</cc>
    
    <cc>julian.reschke</cc>
    
    <cc>mike</cc>
    
    <cc>public-html-admin</cc>
    
    <cc>public-html-wg-issue-tracking</cc>
          
          <qa_contact name="HTML WG Bugzilla archive list">public-html-bugzilla</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>50956</commentid>
    <comment_count>0</comment_count>
    <who name="">contributor</who>
    <bug_when>2011-07-13 06:27:06 +0000</bug_when>
    <thetext>Specification: http://www.whatwg.org/specs/web-apps/current-work/multipage/iana.html
Multipage: http://www.whatwg.org/C#text/html-sandboxed
Complete: http://www.whatwg.org/c#text/html-sandboxed

Comment:
In order to support all media types being sandboxed, I suggest that an
application/sandbox type be proposed which supports a type parameter. For
example, sandboxed text/html would be &quot;application/sandbox; type=text/html&quot;

Posted from: 98.235.63.240
User agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.112 Safari/534.30</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>50957</commentid>
    <comment_count>1</comment_count>
    <who name="Eli Grey">bugmail</who>
    <bug_when>2011-07-13 06:40:12 +0000</bug_when>
    <thetext>For additional parameters meant to be proxied to the sandboxed media type, it seems reasonable to proxy all parameters other than &quot;type&quot; to sandbox, but this may break a media type that actually has a &quot;type&quot; parameter, so it may be safer to just use something like a &quot;params&quot; parameter to specify parameters to be proxied to the sandboxed media type. An example could be &quot;application/sandbox; type=example/format; params=&quot;foo=&apos;bar baz&apos;&quot;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>50958</commentid>
    <comment_count>2</comment_count>
    <who name="Eli Grey">bugmail</who>
    <bug_when>2011-07-13 06:46:27 +0000</bug_when>
    <thetext>Another format I thought of could be to use params for the allow-* parameters and put the full MIME into the type parameter.

For example, you may use this for HTML:

Content-Type: application/sandbox; type=&quot;text/html; foo=&apos;bar ...&apos;&quot; params=&quot;allow-forms allow-scripts&quot;

I feel that this would be the best format to replace text/html-sandboxed with.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>50961</commentid>
    <comment_count>3</comment_count>
    <who name="Anne">annevk</who>
    <bug_when>2011-07-13 12:37:37 +0000</bug_when>
    <thetext>This really is over engineering the solution.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>50978</commentid>
    <comment_count>4</comment_count>
    <who name="Eli Grey">bugmail</who>
    <bug_when>2011-07-13 19:18:21 +0000</bug_when>
    <thetext>How would you sandbox an image/svg+xml game that a user uploads then? I may be over engineering here but the fact is that text/html-sandboxed is terribly unsuited for this.

To simplify the solution, it might just be best to go with a Sandbox: [options] HTTP header. For example,

Content-Type: image/svg+xml
Sandbox: allow-scripts

...</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>50979</commentid>
    <comment_count>5</comment_count>
    <who name="Eli Grey">bugmail</who>
    <bug_when>2011-07-13 19:48:47 +0000</bug_when>
    <thetext>I have came up with a final solution to this problem: just remove text/html-sandboxed and don&apos;t provide any other sandboxing features than that of what is offered for iframes.

Sandboxing on the media type/HTTP level is best suited for Mozilla&apos;s CSP proposal, and has no place in HTML5. I have submitted https://bugzilla.mozilla.org/show_bug.cgi?id=671389 for integration of HTML5 sandboxing features into CSP.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>52593</commentid>
    <comment_count>6</comment_count>
    <who name="Michael[tm] Smith">mike</who>
    <bug_when>2011-08-04 05:02:55 +0000</bug_when>
    <thetext>mass-moved component to LC1</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>54547</commentid>
    <comment_count>7</comment_count>
    <who name="Ian &apos;Hixie&apos; Hickson">ian</who>
    <bug_when>2011-08-10 01:57:26 +0000</bug_when>
    <thetext>EDITOR&apos;S RESPONSE: This is an Editor&apos;s Response to your comment. If you are satisfied with this response, please change the state of this bug to CLOSED. If you have additional information and would like the editor to reconsider, please reopen this bug. If you would like to escalate the issue to the full HTML Working Group, please add the TrackerRequest keyword to this bug, and suggest title and text for the tracker issue; or you may create a tracker issue yourself, if you are able to do so. For more details, see this document:
   http://dev.w3.org/html5/decision-policy/decision-policy.html

Status: Rejected
Change Description: no spec change
Rationale: We don&apos;t have to sandbox all media types. HTML and XML are the only ones that are problematic, and XML doesn&apos;t yet have realistic use cases here (and could in the future be easily addressed by a separate sandboxing type for XML — I&apos;ll let the XML community worry about that).

The reason for having this type is so that someone can host an HTML file sandboxed in an iframe, yet still be safe from hostile people pointing their users at unsandboxed iframes pointing at that document. There&apos;s no reason to have the &quot;allow-*&quot; keywords here, they&apos;ll be on the iframe.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>