-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Planning server-side agility #40
Comments
Right now, we treat If we added things like nonces, I'd expect us to include those in the As you note, this would be a change that required developers to come along with us. We'd approach it like any other breaking change. That said, it's not clear to me that we'd want to enforce these kinds of requirements at a platform level. I'd instead aim for allowing applications to define constraints that make sense for their use cases, and giving them hooks that allow clients to understand what they should enforce. #41 describes how we might do this for nonces. It'd be feasible to extend that to components as well (though it'd end up being fairly verbose, and we might want a page level construct, a la
I think it ought to be, as it's the only model that keeps signing keys off of frontend servers.
Ideally, no! But in dynamic implementations, probably. @ddworken can probably expound upon Google Security's initial thoughts on this; my understanding is that both offline and online scenarios exist, and they'll mitigate risk by having different keys for different resources.
I don't see why not. Including So, I agree that I wouldn't want it enforced everywhere. :)
I think there are two levels here:
SWAG could help with both, I'm confident. /cc @simoneonofri @torgo |
Fully agree. I hadn't even considered this way of enabling them. 👍 Apologies for the dumb take because of that :)
Hm, yeah, that makes sense. I was approaching it from the angle that we can't revoke signatures, enforcing Between the
Re-reading the RFC, I now realize |
Yup. But that's clearly not what we want to ship, so I'd suggest considering it a bug. At the very least, we want to include derived components like Header components are more complex only because of serialization. But we should be able to define a reasonable subset to start with, and expand it over time as people point out things we missed. |
What's SWAG? :)
Makes sense and would address my comment on #5 (comment) |
Related to #37 but different enough to warrant its own issue, imho.
Clients can request certain properties in the signature using the
Accept-Signature
header. The present RFC currently gives the following example:Accept-Signature: sig0=("identity-digest";sf);keyid="JrQLj5P/89iXES9+vFgrIy29clF9CC/oPPsw3c5D0bs=";type="sri"
.My concern is that changes to that header are potentially breaking changes, depending on how user agents enforce them.
Quote from RFC-9421:
The present RFC suggests:
These sort of changes would be breaking changes, directly impact how developers implement signatures, and change the threat model we help protect against:
Separately from this decision, maybe it would make sense to help developers (SWAG?) pick a list of sensible components/parameters to include, if possible? For example, I believe I should always include
@authority
in my signature to play nicer with CSP, but I'm not sure I'd want it enforced everywhere.The text was updated successfully, but these errors were encountered: