This repository has been archived by the owner on Jan 24, 2024. It is now read-only.
Clarify the behavior of the Cross-Origin-Opener-Policy
header
#3492
Labels
Content:HTTP
This is related to HTTP content
URL(s)
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy
Request type
Details
I'd like to recommend a couple of updates to the recent COOP article to better explain its behavior.
/cc @annevk @Elchi3
Introduction
Replace "cache attacks" with "cross-origin attacks" or "information disclosure attacks". XS-Leaks aren't only cache-based, and the ones that COOP prevents are based on direct DOM access to other documents.
This isn't accurate because same-origin pop-up with same COOP will still retain the
window.opener
. I'd rephrase this to something like:"If a cross-origin document with COOP is opened in a new window, the opening document will lost a reference to it, and the
window.opener
property of the new window will benull
. This allows you to have more control over references to a window thanrel=noopener
, which only affects outgoing navigations."Syntax | Directives |
same-origin
"Shares the same browsing context group with same-origin documents whose COOP is also explicitly set to
same-origin
."Examples
@annevk Is
Performance.now()
restricted by COOP+COEP? I thought it's just SAB and the two other APIs listed in https://web.dev/coop-coep/Browser compatibility
COOP also shipped in Chrome 83.
The text was updated successfully, but these errors were encountered: