-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signature-based Integrity #434
Comments
FYI: I filed a TAG review request in w3ctag/design-reviews#1041. It'd be helpful to get y'all's thoughts on this proposal as input to that discussion. :) |
Please don't add RSA PKCSv1_5 as an option. Implementations of that have had many, many issues and ECDSA/edDSA are well known and available everywhere and provide more than enough options for implementors in my opinion. |
Skimming through this https://www.rfc-editor.org/rfc/rfc9421.html#name-creating-the-signature-base :
|
Thanks for the feedback, @nmahendru!
Sure. I don't see any need to extend beyond Ed25519 at the moment, and that's the only algorithm defined as acceptable in this proposal.
RFC9421 defines a very flexible, generic signature mechanism; this proposal only uses a subset, defined in https://wicg.github.io/signature-based-sri/#profile. It locks the SRI profile to Ed25519, embeds the public key in the |
WebKittens
@annevk @Wilander
Title of the proposal
Signature-based Integrity
URL to the spec
https://wicg.github.io/signature-based-sri/
URL to the spec's repository
https://github.com/WICG/signature-based-sri
TAG Design Review URL
Waiting to get feedback/signal from y'all and our friends at Mozilla
Mozilla standards-positions issue URL
mozilla/standards-positions#1139
WebKit Bugzilla URL
No response
Radar URL
No response
Description
It would be nice if web developers could verify the provenance of resources they depend upon, establishing the technical foundations upon which they can increase confidence in the integrity of their dependencies. We offer brittle, content-based integrity mechanisms today which can (in theory) but do not (in practice) enable this capability. This proposal explores an alternative that builds upon existing integrity checks (e.g.
<script integrity>
and signature mechanisms (RFC9421 to give developers an additional option when deciding how to protect their sites from unexpected injection.In short, developers will include the following on their site:
Servers will deliver resources signed with the asserted key:
Modulo a few details we're still working out in the draft spec and on GitHub, that's it. Easy peasy. WDYT?
The text was updated successfully, but these errors were encountered: