You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I'm requesting a TAG review of Signature-Based Integrity.
TL;DR: It would be nice if web developers could verify the provenance of resources they depend upon, establishing
a technical foundations upon which they can build confidence in the integrity of their supply chain. SRI offers brittle, content-based integrity mechanisms today which can (in theory) but do not (in practice) enable this capability. This proposal explores an alternative that builds upon existing integrity checks (e.g. <script integrity> and HTTP Message Signatures to give developers an additional option when deciding how to protect their sites from unexpected injection.
In short, developers will include the following on their site:
<scriptsrc="https://amazing.example/widget.js"
crossorigin="anonymous"
integrity="ed25519-[base64-encoded public key]"></script>
Servers will deliver resources signed with the asserted key:
HTTP/1.1 200 OKAccept-Ranges: noneVary: Accept-EncodingContent-Type: text/javascript; charset=UTF-8Access-Control-Allow-Origin: *Identity-Digest: sha-512=:[base64-encoded digest of the response body]:Signature-Input: sig1=("identity-digest";sf); keyid="[base64-encoded public key]"; tag="sri"Signature: sig1=:[base64-encoded result of Ed25519([response metadata], [private key])]:
The group where the incubation/design work on this is being done (or is intended to be done in the future): WICG
The group where standardization of this work is intended to be done ("unknown" if not known): WebAppSec & WHATWG
Existing major pieces of multi-implementer review or discussion of this design: Nothing that isn't represented in the GitHub Issues. I've presented to WebAppSec thrice
Major unresolved issues with or opposition to this design: None that I know of.
This work is being funded by: Google.
I'd highlight a few comment threads that might be helpful for y'all to weigh in on specifically:
(Also (because everyone loves bikeshedding!), it might be helpful for y'all to have an opinion on the Identity-Digest header name that this proposal depends upon: LPardue/draft-pardue-http-identity-digest#10.)
Guten TAG!
I'm requesting a TAG review of Signature-Based Integrity.
TL;DR: It would be nice if web developers could verify the provenance of resources they depend upon, establishing
a technical foundations upon which they can build confidence in the integrity of their supply chain. SRI offers brittle, content-based integrity mechanisms today which can (in theory) but do not (in practice) enable this capability. This proposal explores an alternative that builds upon existing integrity checks (e.g.
<script integrity>
and HTTP Message Signatures to give developers an additional option when deciding how to protect their sites from unexpected injection.In short, developers will include the following on their site:
Servers will deliver resources signed with the asserted key:
Further details:
I'd highlight a few comment threads that might be helpful for y'all to weigh in on specifically:
Thanks for your time!
The text was updated successfully, but these errors were encountered: