<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>39219</bug_id>
          
          <creation_ts>2010-05-17 08:23:48 -0700</creation_ts>
          <short_desc>Offer user option to override sandbox plugin flag</short_desc>
          <delta_ts>2023-07-28 10:10:49 -0700</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>Frames</component>
          <version>528+ (Nightly build)</version>
          <rep_platform>All</rep_platform>
          <op_sys>OS X 10.5</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>WONTFIX</resolution>
          
          
          <bug_file_loc>http://173.203.83.120/sandbox-bug</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>0</everconfirmed>
          <reporter name="Artur">arturadib</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>abarth</cc>
    
    <cc>ahmad.saleem792</cc>
    
    <cc>ap</cc>
    
    <cc>beidson</cc>
    
    <cc>ian</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>226770</commentid>
    <comment_count>0</comment_count>
    <who name="Artur">arturadib</who>
    <bug_when>2010-05-17 08:23:48 -0700</bug_when>
    <thetext>When an iframe is sandboxed, WebKit is setting the &quot;plugins browsing context flag&quot;, as per the HTML5 doc (http://www.whatwg.org/specs/web-apps/current-work/#sandboxed-plugins-browsing-context-flag).

However, no option is being offered for the user to override the flag.  According to the HTML5 doc (http://www.whatwg.org/specs/web-apps/current-work/#the-embed-element), if the sandboxed plugin flag is set:

&quot;The user agent may offer the user the option to override the sandbox and instantiate the plugin anyway; if the user invokes such an option, the user agent must act as if the conditions above did not apply for the purposes of this element.&quot;

The absence of this option renders several plugin-based sites unusable, such as those with embedded YouTube videos (see example URL: http://173.203.83.120/sandbox-bug).

(Alternatively, perhaps WebKit can offer another sandbox option, like &quot;allow-plugins&quot;?)</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>227900</commentid>
    <comment_count>1</comment_count>
    <who name="Brady Eidson">beidson</who>
    <bug_when>2010-05-19 11:10:20 -0700</bug_when>
    <thetext>(In reply to comment #0)
&gt; When an iframe is sandboxed, WebKit is setting the &quot;plugins browsing context flag&quot; ...
&gt; 
&gt; However, no option is being offered for the user to override the flag.  According to the HTML5 doc (http://www.whatwg.org/specs/web-apps/current-work/#the-embed-element), if the sandboxed plugin flag is set:
&gt; 
&gt; &quot;The user agent may offer the user the option to override the sandbox and instantiate the plugin anyway; if the user invokes such an option, the user agent must act as if the conditions above did not apply for the purposes of this element.&quot;
&gt; 
&gt; The absence of this option renders several plugin-based sites unusable, such as those with embedded YouTube videos (see example URL: http://173.203.83.120/sandbox-bug).

It doesn&apos;t render the site unusable.  It renders the site unusable from within a sandboxed iframe.  Why not visit YouTube directly?

&gt; (Alternatively, perhaps WebKit can offer another sandbox option, like &quot;allow-plugins&quot;?)

This is possible, and when learning about sandboxing very recently, I was surprised it *wasn&apos;t* an option.  Perhaps poking WhatWG and Hixie about this would be worthwhile.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>227908</commentid>
    <comment_count>2</comment_count>
    <who name="Artur">arturadib</who>
    <bug_when>2010-05-19 11:29:05 -0700</bug_when>
    <thetext>The &quot;allow-scripts&quot; option makes sense and would suit my needs, but I wonder if asking the user would be useful for other applications.  I don&apos;t see why not; it&apos;s already in the HTML5 specs.

Can anyone chime in on the possible issues with &quot;allow-scripts&quot;?


(In reply to comment #1)
&gt; 
&gt; This is possible, and when learning about sandboxing very recently, I was surprised it *wasn&apos;t* an option.  Perhaps poking WhatWG and Hixie about this would be worthwhile.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>231724</commentid>
    <comment_count>3</comment_count>
    <who name="Artur">arturadib</who>
    <bug_when>2010-05-28 08:40:28 -0700</bug_when>
    <thetext>I meant &quot;allow-plugins&quot;, of course.


(In reply to comment #2)
&gt; The &quot;allow-scripts&quot; option makes sense and would suit my needs, but I wonder if asking the user would be useful for other applications.  I don&apos;t see why not; it&apos;s already in the HTML5 specs.
&gt; 
&gt; Can anyone chime in on the possible issues with &quot;allow-scripts&quot;?
&gt; 
&gt; 
&gt; (In reply to comment #1)
&gt; &gt; 
&gt; &gt; This is possible, and when learning about sandboxing very recently, I was surprised it *wasn&apos;t* an option.  Perhaps poking WhatWG and Hixie about this would be worthwhile.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>231780</commentid>
    <comment_count>4</comment_count>
    <who name="Adam Barth">abarth</who>
    <bug_when>2010-05-28 10:35:16 -0700</bug_when>
    <thetext>I believe the issue is that plugins don&apos;t understand @sandbox and therefore could be used to defeat its security properties.  The working group has discussed this issue, and I think the conclusion was that we should hold off on adding this feature until at least one plugin understands the sandbox security model.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1968326</commentid>
    <comment_count>5</comment_count>
    <who name="Ahmad Saleem">ahmad.saleem792</who>
    <bug_when>2023-07-26 15:05:48 -0700</bug_when>
    <thetext>Plugins are gone - so is this applicable in any other context?</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>