Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sending expected headers & allowing public keys integrity #62

Closed
homakov opened this issue Dec 19, 2016 · 3 comments
Closed

Sending expected headers & allowing public keys integrity #62

homakov opened this issue Dec 19, 2016 · 3 comments

Comments

@homakov
Copy link

homakov commented Dec 19, 2016

Here are two features I believe could be super useful.

  1. If the integrity attribute is set, let's send it in the request header

<script integrity_no="sha256-sha" crossorigins=="anonymous" src="https://APP/sdk.js"></script>

Will add a header Integrity: sha256-sha. This way the APP server knows what version of SDK should be served and can route the request to specific file version. Now we must change the URL along to sdk-1.3.5.js every time new version is out. I don't think leaking expected integrity presents any security risk.

  1. Allowing public keys (1 or more) to be used in integrity attribute e.g. integrity=ec25519-PUB & ec25519-PUB2 and the response must include Integrity-Signatures header with both of them (private keys could be stored on separate laptops of two developers making it harder to take over critical stuff like addthis.js (cough).

Actually, I'd love to see something general like setting public keys in the app/manifest.json and requiring signatures per every resource load, that would basically solve the web app trust problem, but SRI is a good start.

What are your thoughts? @mikewest @devd @fmarier @metromoxie

@annevk
Copy link
Member

annevk commented Dec 19, 2016

1 is a duplicate of #47.

@mozfreddyb
Copy link
Collaborator

And 2 is w3c/webappsec#449
Thank you for your comments, Egor. Closing this in favor of the original threads.

@annevk
Copy link
Member

annevk commented Dec 19, 2016

@mozfreddyb you should probably move that second thread here. I was sure I read about it before, but couldn't find it in this repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants