Skip to content

Commit

Permalink
Incorporate tidoust suggestions
Browse files Browse the repository at this point in the history
  • Loading branch information
mfoltzgoogle committed Jun 3, 2015
1 parent c88ff79 commit 4b1cc8e
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 32 deletions.
28 changes: 13 additions & 15 deletions Overview.src.html
Expand Up @@ -1436,24 +1436,20 @@ <h3>
</h3>
<p>
A <span>presentation session</span> is allowed to be accessed across
origins; the URL that started the presentation and the presentation ID
are the only information needed to join a session from any origin in
that user agent. In other words, a presentation is not tied to a
particular opening origin.
origins; the presentation URL and presentation ID used to create the
presentation are the only information needed to join a session from any
origin in that user agent. In other words, a presentation is not tied
to a particular opening origin.
</p>
<p>
The security of the presentation ID prevents arbitrary pages from
connecting to an existing presentation. We could further restrict the
set of presentations per origin to ensure that an unwanted page cannot
hijack a presentation it did not create, for example by saying that D
is represented as a set of tuples (O, U, I, S) where O is the URL of
the opening browsing context, and by adjusting algorithms accordingly.
However, this would prevent controlling contexts from different domains
from connecting to a shared presentation resource.
This design allows controlling contexts from different domains to
connect to a shared presentation resource. The security of the
presentation ID prevents arbitrary pages from connecting to an existing
presentation.
</p>
<p>
This specification does not prohibit a user agent from publishing
information about its <span>set of presentations</span>. The charter
information about its <span>set of presentations</span>. The group
envisions a user agent on a another device (distinct from the
controller or presentation) becoming authorized to join the
presentation, either by user action or by discovering the
Expand Down Expand Up @@ -1481,8 +1477,10 @@ <h3>
The presentation URL and presentation ID can be used to connect to a
presentation session from another browsing context. They can be
intercepted if an attacker can inject content into the controlling
page. Again, one possible solution would be to restrict the API to
secure contexts.
page.
</p>
<p class="open-issue">
Should we restrict the API to some extent in non secure contexts?
</p>
<h3>
Incognito mode and clearing of browsing data
Expand Down
32 changes: 15 additions & 17 deletions index.html
Expand Up @@ -77,8 +77,8 @@
<h1>
Presentation API
</h1>
<h2 class="no-num no-toc" id="editor's-draft-2-june-2015">
Editor's Draft 2 June 2015
<h2 class="no-num no-toc" id="editor's-draft-3-june-2015">
Editor's Draft 3 June 2015
</h2>
<dl>
<dt>
Expand Down Expand Up @@ -1472,24 +1472,20 @@ <h3 id="cross-origin-access"><span class="secno">7.2 </span>
</h3>
<p>
A <a href="#presentation-session">presentation session</a> is allowed to be accessed across
origins; the URL that started the presentation and the presentation ID
are the only information needed to join a session from any origin in
that user agent. In other words, a presentation is not tied to a
particular opening origin.
origins; the presentation URL and presentation ID used to create the
presentation are the only information needed to join a session from any
origin in that user agent. In other words, a presentation is not tied
to a particular opening origin.
</p>
<p>
The security of the presentation ID prevents arbitrary pages from
connecting to an existing presentation. We could further restrict the
set of presentations per origin to ensure that an unwanted page cannot
hijack a presentation it did not create, for example by saying that D
is represented as a set of tuples (O, U, I, S) where O is the URL of
the opening browsing context, and by adjusting algorithms accordingly.
However, this would prevent controlling contexts from different domains
from connecting to a shared presentation resource.
This design allows controlling contexts from different domains to
connect to a shared presentation resource. The security of the
presentation ID prevents arbitrary pages from connecting to an existing
presentation.
</p>
<p>
This specification does not prohibit a user agent from publishing
information about its <span>set of presentations</span>. The charter
information about its <span>set of presentations</span>. The group
envisions a user agent on a another device (distinct from the
controller or presentation) becoming authorized to join the
presentation, either by user action or by discovering the
Expand Down Expand Up @@ -1517,8 +1513,10 @@ <h3 id="temporary-identifiers-and-browser-state"><span class="secno">7.4 </span>
The presentation URL and presentation ID can be used to connect to a
presentation session from another browsing context. They can be
intercepted if an attacker can inject content into the controlling
page. Again, one possible solution would be to restrict the API to
secure contexts.
page.
</p>
<p class="open-issue">
Should we restrict the API to some extent in non secure contexts?
</p>
<h3 id="incognito-mode-and-clearing-of-browsing-data"><span class="secno">7.5 </span>
Incognito mode and clearing of browsing data
Expand Down

0 comments on commit 4b1cc8e

Please sign in to comment.