-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signature-Based Integrity. #1041
Comments
|
Having spent a little time discussing a few issues with Mike on his issue tracker, I'm starting to think that this probably needed to be marked as an early review rather than a final review. There are a couple of pretty fundamental issues that still need resolution. In particular, WICG/signature-based-sri#45, WICG/signature-based-sri#44, WICG/signature-based-sri#38, and (I can't find the number) a very serious question about whether the signature needs to cover the (current) request URL. Should this spend a little more time in the shop before we review it like it's done? |
I appreciate y'all's feedback and engagement however you'd like to label it, and the questions you've raised are quite helpful! The two questions I think are most pressing are:
The question of covering the current request URL seems like it was answered: In parallel with continuing the conversation on those issues, my plan at the moment is:
Does that sound reasonable to y'all? Thanks again for your time and attention! |
Guten TAG!
I'm requesting a TAG review of Signature-Based Integrity.
TL;DR: It would be nice if web developers could verify the provenance of resources they depend upon, establishing
a technical foundations upon which they can build confidence in the integrity of their supply chain. SRI offers brittle, content-based integrity mechanisms today which can (in theory) but do not (in practice) enable this capability. This proposal explores an alternative that builds upon existing integrity checks (e.g.
<script integrity>
and HTTP Message Signatures to give developers an additional option when deciding how to protect their sites from unexpected injection.In short, developers will include the following on their site:
Servers will deliver resources signed with the asserted key:
Further details:
I'd highlight a few comment threads that might be helpful for y'all to weigh in on specifically:
The bottom half of Inline scripts, CSP, and SRI WICG/signature-based-sri#10 discusses the applicability of this model to inline scripts, where the dependency on HTTP Message Signatures doesn't really fit.[Update, 2025-02-06] I ended up turning this into https://mikewest.github.io/inline-integrity/, which I'll present to WebAppSec this month, and come back to y'all if there's enough interest to justify the work.Thanks for your time!
The text was updated successfully, but these errors were encountered: