Commit af42b4cc authored by mkwst@chromium.org's avatar mkwst@chromium.org

Adding `chrome-extension` resources to the CSP relaxation documentation.

BUG=139443

Review URL: https://chromiumcodereview.appspot.com/10823074

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@148934 0039d316-1c4b-4281-b951-d872f2087c98
parent e9219583
......@@ -405,13 +405,14 @@ popup.html:
<p>
If, on the other hand, you have a need for some external JavaScript or object
resources, you can relax the policy to a limited extent by whitelisting
specific HTTPS origins from which scripts should be accepted. Whitelisting
insecure HTTP resources will have no effect. This is intentional, because
we want to ensure that executable resources loaded with an extension's
elevated permissions is exactly the resource you expect, and hasn't been
replaced by an active network attacker. As <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle
attacks</a> are both trivial and undetectable over HTTP, only HTTPS origins
will be accepted.
secure origins from which scripts should be accepted. We want to ensure that
executable resources loaded with an extension's elevated permissions are
exactly the resources you expect, and haven't been replaced by an active
network attacker. As <a href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle
attacks</a> are both trivial and undetectable over HTTP, those origins will
not be accepted. Currently, we allow whitelisting origins with the following
schemes: <code>HTTPS</code>, <code>chrome-extension</code>, and
<code>chrome-extension-resource</code>.
</p>
<p>
A relaxed policy definition which allows script resources to be loaded from
......
......@@ -225,14 +225,15 @@ popup.html:
<p>
If, on the other hand, you have a need for some external JavaScript or object
resources, you can relax the policy to a limited extent by whitelisting
specific HTTPS origins from which scripts should be accepted. Whitelisting
insecure HTTP resources will have no effect. This is intentional, because
we want to ensure that executable resources loaded with an extension's
elevated permissions is exactly the resource you expect, and hasn't been
replaced by an active network attacker. As <a
secure origins from which scripts should be accepted. We want to ensure that
executable resources loaded with an extension's elevated permissions are
exactly the resources you expect, and haven't been replaced by an active
network attacker. As <a
href="http://en.wikipedia.org/wiki/Man-in-the-middle_attack">man-in-the-middle
attacks</a> are both trivial and undetectable over HTTP, only HTTPS origins
will be accepted.
attacks</a> are both trivial and undetectable over HTTP, those origins will
not be accepted. Currently, we allow whitelisting origins with the following
schemes: <code>HTTPS</code>, <code>chrome-extension</code>, and
<code>chrome-extension-resource</code>.
</p>
<p>
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment