1. Introduction
This section is not normative.
When a user successfully loads a resource from example.com over a secure channel (HTTPS, for example), the user agent is able to make three assertions critical to the user’s security and privacy:
-
The user is communicating with a server that is allowed to claim to be
example.com
, and not one of the many, many servers through which her request has hopped. The connection can be authenticated. -
The user’s communications with
example.com
cannot be trivially eavesdropped upon by middlemen, because the requests she makes and the responses she receives are encrypted. -
The user’s communications with
example.com
cannot be trivially modified by middlemen, the encryption and authentication provide a guarantee of data integrity.
Together, these assertions give the user some assurance that
example.com
is the only entity that can read and respond to her
requests (caveat: without shocking amounts of work) and that the bits she’s
received are indeed those that example.com
actually sent.
The strength of these assertions is substantially weakened, however, when the encrypted and authenticated resource requests subresources (scripts, images, etc) over an insecure channel. Those resource requests result in a resource whose status is mixed, as insecure requests are wide open for man-in-the-middle attacks. This scenario is unfortunately quite common.
This specification details how a user agent can mitigate these risks to security and privacy by limiting a resource’s ability to inadvertently communicate in the clear.
Note: Nothing described in this document is really new; everything covered here has appeared in one or more user agents over the years: Internet Explorer led the way, alerting users to mixed content since around version 4.
2. Key Concepts and Terminology
- mixed content
-
A resource or request is mixed content if its
origin is insecure, and the context
responsible for loading it restricts mixed content. See
§5.1
Does settings object restrict mixed content? for a normative definition of the latter.
Inside a context that restricts mixed content (
https://secure.example.com/
, for example):-
A request for the script
http://example.com/script.js
is mixed content. As script requests are blockable, the user agent will return a network error rather than loading the resource. -
A request for the image
http://example.com/image.png
is mixed content. As image requests are optionally-blockable, the user agent might load the image, in which case the image resource itself would be mixed content.
If mixed content is loaded into a context that restricts mixed content (as in #2 above), that context is considered a mixed security context (as defined in [RFC6797]).
Note: "Mixed content" was originally defined in section 5.3 of [WSC-UI]. This document updates that initial definition.
Note: [XML] also defines an unrelated "mixed content". concept. This is potentially confusing, but given the term’s near ubiquitious usage in a security context across user agents for more than a decade, the practical risk of confusion seems low.
-
-
potentially secure origin
- potentially secure URL
-
An origin is said to be potentially secure
if the origin’s scheme component is
HTTPS
,WSS
, orabout
.A URL whose origin is potentially secure is itself considered to be potentially secure.
-
a priori insecure origin
- a priori insecure URL
-
Any origin which is not potentially secure is said to
be a priori insecure. We know, for
example, that
(http, example.com, 80)
is insecure just by looking at its scheme component.A URL whose origin is a priori insecure is itself considered to be a priori insecure.
-
insecure origin
- insecure URL
-
A resource’s origin is said to be insecure if it is
either a priori insecure, or the user agent discovers
only after performing a TLS-handshake that the Response’s HTTPS
state is
deprecated authentication
.A URL whose origin is insecure is itself considered to be insecure.
- embedding document
-
Given a
Document
A, the embedding document of A is theDocument
through which A’s browsing context is nested.
3. Content Categories
In a perfect world, each user agent would be required to block all mixed content without exception. Unfortunately, that is impractical on today’s Internet; a user agent needs to be more nuanced in its restrictions to avoid degrading the experience on a substantial number of websites.
With that in mind, we here split mixed content into two categories: §3.1 Optionally-blockable Content and §3.2 Blockable Content.
Note: Future versions of this specification will update this categorization with the intent of moving towards a world where all mixed content is blocked; that is the end goal, but this is the best we can do for now.
3.1. Optionally-blockable Content
A resource or request is optionally-blockable when the risk of allowing its usage as mixed content is outweighed by the risk of breaking significant portions of the web. This could be because mixed usage of the resource type is sufficiently high, and because the resource is low-risk in and of itself. The fact that these resource types are optionally-blockable does not mean that they are safe, simply that they’re less catastrophically dangerous than other resource types. For example, images and icons are often the central UI elements in an application’s interface. If an attacker reversed the "Delete email" and "Reply" icons, there would be real impact to users.
This category of content includes:
-
Images loaded via img
Note: This includes SVG documents loaded as images, as they are banned from executing script or loading subresources.
- Video loaded via video and source
- Audio loaded via audio and source
- Prefetched content [HTML5]
These resource types map to the following Fetch request contexts:
audio
, image
, prefetch
, and
video
. These contexts are optionally-blockable request
contexts.
Note: We further limit this category in §5.2
Should fetching request be blocked as mixed content? by
force-failing any CORS-enabled request. This means that mixed content images
loaded via <img crossorigin ...>
will be blocked. This is
a good example of the general principle that a category of content falls
into this category only when it is too widely used to be blocked
outright. The Working Group intends to find more blockable subsets of an
otherwise optionally-blockable request context.
3.2. Blockable Content
Any resource or request that isn’t optionally-blockable is
blockable. Typical examples of this kind of content include scripts,
plugin data, data requested via XMLHttpRequest
, and so on. Every
request context that is not optionally-blockable is a
blockable request context. This explicitly includes any contexts
defined after publication of this document.
Note: The request contexts form
, hyperlink
, and
location
might refer to top-level browsing context
navigations, which are not considered mixed
content. See the treatment of request context frame type in
§5.2
Should fetching request be blocked as mixed content? for details.
Note: The plugin
request context is used for requests made on
behalf of a plugin. We categorize these requests as blockable, but recognize
that user agents aren’t always in a position to mediate these requests.
NPAPI plugins, for instance, often have direct network access, and can
generally bypass the user agent entirely. We recommend that plugin vendors
implement mixed content checking themselves to mitigate the risks outlined
in this document.
4. Strict Mixed Content Checking
In order to give authors assurance that mixed content will never degrade the security UI presented to their users (as described in §7.3 UI Requirements), authors may choose to enable a stricter variant of mixed content checking which will both block optionally-blockable and blockable mixed content, and suppress the user override options discussed in §7.4 User Controls.
To this end, Document
objects and browsing contexts have a
strict mixed content checking flag which is set to
false
unless otherwise specified. This flag is checked in both
§5.2
Should fetching request be blocked as mixed content? and §5.3
Should response to request be blocked as mixed
content? to determine whether
the Document
is in strict mode.
Document
may opt itself into strict mode by either delivering a
Content-Security-Policy
HTTP header, like:
Content-Security-Policy: block-all-mixed-content
or by embedding the policy in a meta element, like:
<meta http-equiv="Content-Security-Policy" content="block-all-mixed-content">
Note: Strict mixed content checking is inherited by embedded content; if a page opts into strict mode, framed pages will be prevented from loading mixed content, as described in §4.3 Inheriting an opt-in.
4.1. Effects
If a Document
's strict mixed content checking flag is set to
true
, the user agent MUST:
- treat optionally-blockable mixed content as though it were blockable.
-
NOT provide users with a mechanism for forcing blockable
mixed content to load.
Note: This requirement overrides the suggestion in §7.4 User Controls.
-
NOT provide any user-facing indication that mixed content is present.
Note: This requirement overrides the suggestion in §7.3 UI Requirements, which is safe to do since the combination of the first and second requirements above ensure that mixed content will never load in this page’s context.
Note: This requirement does not include developer-facing indicators such as console messages.
-
ensure that these requirements are applied to any
Document
in a nested browsing context, as described in §4.3 Inheriting an opt-in.
4.2. Opting-in
Authors may opt a Document
into strict mixed content checking via a
block-all-mixed-content Content Security Policy directive
[CSP2], defined via the following ABNF grammar.
directive-name = "block-all-mixed-content" directive-value = ""
When enforcing the block-all-mixed-content
directive,
set the protected resource’s strict mixed content checking flag to
true
.
This directive has no effect when monitored. This directive’s only effect is to set a policy flag on the protected resource; it will therefore never be violated, and has no reporting requirements.
Note: A similar effect may be achieved on a more granular level by setting
individual directives. For example img-src https:
would prevent
insecure images from loading.
4.3. Inheriting an opt-in
If a Document
's strict mixed content checking flag is set, the user
agent MUST ensure that all nested browsing contexts inherit the setting
in the following ways:
-
When a nested browsing context context is created, set
its strict mixed content checking flag to
true
if context’s embedding document’s strict mixed content checking flag is set totrue
. -
When creating a new
Document
object, set its strict mixed content checking flag totrue
if its browsing context’s strict mixed content checking flag istrue
.
5. Insecure Content in Secure Contexts
At a high level, the following algorithms allow user agents to determine whether particular requests should succeed, or should result in network errors.
Fetch calls the algorithm defined in §5.2 Should fetching request be blocked as mixed content? during Step 4 of the Fetching algorithm [FETCH] in order to block network traffic to a priori insecure origins.
Note: Hooking into Fetch here ensures that we catch not only the initial request, but all redirects as well.
Further, Fetch calls the algorithm defined in §5.3 Should response to request be blocked as mixed content? during Step 7 of the Fetching algorithm [FETCH] in order to block responses from insecure origins.
Note: This hook is necessary to detect resources modified or synthesized by a ServiceWorker, as well as to determine whether a resource is insecure once the TLS-handshake has finished. See steps 4.1 and 4.2 of the algorithm defined in §5.3 Should response to request be blocked as mixed content? for detail.
The algorithm defined in §5.1 Does settings object restrict mixed content? is used by both §5.2 Should fetching request be blocked as mixed content? and §5.3 Should response to request be blocked as mixed content?, as well as §6 Modifications to WebSockets in order to determine whether an insecure request ought to be blocked.
5.1. Does settings object restrict mixed content?
Both documents and workers have environment settings objects which
may be examined according to the following algorithm in order to determine
whether they restrict mixed content. This algorithm returns Restricts
Mixed Content
or Does Not Restrict Mixed Content
, as
appropriate.
Given an environment settings object settings:
-
If settings' HTTPS state is not
unauthenticated
, then return Restricts Mixed Content. -
If settings has a responsible document
document, then:
-
While document has an embedding document:
- Let document be document’s embedding document.
- Let embedder settings be document’s incumbent settings object.
-
If embedder settings' HTTPS state is not
unauthenticated
, then return Restricts mixed content.
-
While document has an embedding document:
- Return Does Not Restrict Mixed Content.
http://a.com
loads http://evil.com
. The
insecure request will be allowed, as a.com
was not loaded
over a secure connection.
https://a.com
loads http://evil.com
. The
insecure request will be blocked, as a.com
was loaded over
a secure connection.
http://a.com
frames https://b.com
, which
loads http://evil.com
. In this case, the insecure request
to evil.com
will be blocked, as b.com
was
loaded over a secure connection, even though a.com
was not.
https://a.com
frames a data:
URL, which loads
http://evil.com
. In this case, the insecure request to
evil.com
will be blocked, as a.com
was loaded
over a secure connection, even though the framed data:
URL
is a priori insecure.
5.2. Should fetching request be blocked as mixed content?
Note: The Fetch specification hooks into this algorithm to determine whether a request should be entirely blocked (e.g. because the request is for blockable content, and we can assume that it won’t be loaded over a secure connection).
Given a Request request, a user agent determines whether the Request request should proceed or not via the following algorithm:
-
Let context be request’s
context
. -
Let frame type be request’s
context frame type
. - Let origin be the origin of request’s URL.
-
If §5.1
Does settings object restrict mixed content? returns
Does Not Restrict Mixed Content
when applied to request’s client, return allowed. - If the user agent has been instructed to allow mixed content (as outlined in §7.4 User Controls), return allowed.
-
If request’s
context frame type
istop-level
, return allowed. -
If origin is a priori insecure:
-
If request’s
window
isno-window
, return blocked. -
If request’s
mode
isCORS
orCORS-with-forced-preflight
, return blocked. -
If context is
fetch
:-
If request’s
client
’s global object is aWindow
object, return blocked. -
If request’s
mode
is notno-cors
, return blocked.
-
If request’s
- Otherwise, if context is a blockable request context, return blocked.
- If the user agent is configured to block optionally-blockable mixed content, return blocked.
-
If request’s client’s strict mixed content
checking flag is
true
, return blocked.
-
If request’s
- Return allowed.
Note: We special-case fetch
to allow it as optionally-blockable
in the event that a Service Worker is making a no-cors
request
in response to a Fetch event generated from a Document. In that case, the
request’s client
property will be an environment settings
object whose global object is a Window
object (the Service Worker’s
request’s client
, on the other hand, will be a
WorkerGlobalScope
object.
5.3. Should response to request be blocked as mixed content?
Note: If a request proceeds, we still might want to block the response based on the state of the connection that generated the response (e.g. because the request is blockable, but the connection is insecure). This algorithm is used to make that determination.
Given a request request and response response, the user agent determines what response should be returned via the following algorithm:
-
If §5.1
Does settings object restrict mixed content? returns
Does Not Restrict Mixed Content
when applied to request’s client, return allowed. - If the user agent has been instructed to allow mixed content (as outlined in §7.4 User Controls), return allowed.
- Let context be the request context of request.
-
If context is not an optionally-blockable request
context, or the user agent is configured to block
optionally-blockable mixed content, or request’s
client’s strict mixed content checking flag is
true
:-
If response’s HTTPS state is not
authenticated
, return blocked.Note: This covers both cases in which unauthenticated resources are returned (by a Service Worker, for example), as well as cases in which the TLS handshake succeeds, but the user agent chooses to hold it to a higher standard.
-
If response’s HTTPS state is not
- Return allowed.
6. Modifications to WebSockets
The WebSocket()
constructor algorithm [WEBSOCKETS] is modified as follows:
- Remove the current step 2.
Note: This suggestion is filed as bug #28841 against [WEBSOCKETS].
The Establish a WebSocket Connection algorithm [RFC6455] is modified as follows:
-
After the current step 1, perform the following step:
-
If secure is false, and the algorithm in
§5.1
Does settings object restrict mixed content? returns
Restricts Mixed Content
when applied to client’s entry script’s relevant settings object’s, then the client MUST fail the WebSocket connection and abort the connection [RFC6455].
-
If secure is false, and the algorithm in
§5.1
Does settings object restrict mixed content? returns
-
After the current step 5, perform the following step:
-
If secure is true, and the TLS handshake performed
in step 5 results in
deprecated authentication
, then the client MUST fail the WebSocket connection and abort the connection [RFC6455].
-
If secure is true, and the TLS handshake performed
in step 5 results in
Note: Filed as errata #4398 against [RFC6455].
These changes together mean that we’ll no longer throw a
SecurityError
exception directly upon constructing a WebSocket
object, but will instead rely upon blocking the connection and triggering the
fail the WebSocket connection algorithm, which developers can catch by
hooking a WebSocket
object’s onerror
handler. This is
consistent with the behavior of XMLHttpRequest
, EventSource
, and
Fetch
.
7. Security Considerations
7.1. Limitations
Blocking mixed content allows us to ensure that the guarantees discussed in §1 Introduction are upheld. Note, however, that those guarantees only protect developers and users against active network attackers who would otherwise be able to replace critical bits of code or content on the wire as it flows past. They do not protect against a compromised server that itself is coerced into sending corrupted resources.
Mechanisms such as Subresource Integrity [SRI] are designed to deal with this kind of threat, and we recommend that web developers make use of them whenever possible.
7.2. Form Submission
If §5.1
Does settings object restrict mixed content? returns Restricts Mixed
Content
when applied to a Document
's incumbent settings
object, then a user agent MAY choose to warn users of the presence of
one or more form elements with action
attributes whose values are insecure URLs.
Note: Chrome, for example, currently gives the same UI treatment to a page with an insecure form action as it does for a page that displays an insecure image.
Further, a user agent MAY treat form submissions from such a Document
as a blockable request, even if the submission occurs in
the top-level browsing context.
7.3. UI Requirements
If a user agent would normally indicate to the user that the top-level browsing context is secure, then:
-
When the user agent downgrades a context to a mixed security context by returning a resource in response to a mixed content request (either because the request is optionally-blockable, or because the user agent is configured to allow blockable requests), the user agent MUST NOT provide the user with that same indication.
The user agent SHOULD instead give an indication that mixed content is present.
If a mixed content indication is present, it MUST be made available through accessibility APIs for users of assistive technologies.
Note: This requirement holds even in the context of an EV status [CAB]. An EV certificate’s indicator does not override the necessity to notify users of mixed content violations.
7.4. User Controls
A user agent MAY offer users the ability to directly decide whether or not to treat all mixed content as blockable (meaning that even optionally-blockable mixed content would be blocked).
Note: It is strongly recommended that users take advantage of such an option if provided.
A user agent MAY offer users the ability to override its decision to block blockable mixed content on a particular page.
Note: Practically, a user agent probably can’t get away with not offering such a back door. That said, allowing mixed script is in particular a very dangerous option, and each user agent REALLY SHOULD NOT [RFC6919] present such a choice to users without careful consideration and communication of the risk involved.
Any such controls offered by a user agent MUST also be offered through accessibility APIs for users of assistive technologies.
7.5. Service Workers
The fact that Service Workers sit inbetween a document and the network means that we need to special-case requests made in those contexts. In particular, they should be able to cache the results of insecure requests, provided that those requests were triggered from a document (which, presumably, ensures that they’ll be used in an optionally-blockable context). Those insecure results, however, cannot be exposed to the Service Worker, nor should the Service Worker be allowed to launder responses to optionally-blockable requests into responses to blockable requests.
To that end:
-
§5.2 Should fetching request be blocked as mixed content? has some carve-outs for the
fetch
request context, with the intent of allowing a Service Worker to copy a request as part of its response to a Fetch event (e.g.fetch(event.response)
should be executable inside the event handler.The
fetch
request context will continue to be treated as blockable when executed outside the context of a Fetch event, which of course includes document contexts. -
§5.3 Should response to request be blocked as mixed content? verifies that the incoming response has the same security characteristics that were allowed for the request. That is, a Service Worker will not be able to replace a request for a secure script with a cached response for an insecure resource.
7.6. Further Action
A user agent is encouraged to take further action above and beyond the requirements this document outlines in order to discourage developers from embedding mixed content.
For instance, a user agent could:
-
Interpret the presence of a
Strict-Transport-Security
header field as forcing all content into the blockable category [RFC6797], or as a signal to enable strict mode for mixed content checking. - Modify requests for optionally-blockable resources which are mixed content in order to reduce the risk to users: cookies and other authentication tokens could be stripped from the requests, automatic scheme upgrades could be attempted, and so on.
- Treat optionally-blockable resources inside nested browsing contexts as blockable, to allow sites to embed resources without fear of introducing mixed content.
8. Acknowledgements
In addition to the wonderful feedback gathered from the WebAppSec WG, the Chrome security team was invaluable in preparing this specification. In particular, Chris Palmer, Chris Evans, Ryan Sleevi, Michal Zalewski, Ken Buchanan, and Tom Sepez gave lots of early feedback. Anne van Kesteren explained Fetch and helped define the interface to this specification. Brian Smith helped keep the spec focused, trim, and sane.