- From: Harry Halpin <hhalpin@w3.org>
- Date: Tue, 17 Dec 2013 22:44:37 +0100
- To: Richard Barnes <rbarnes@bbn.com>
- CC: public-web-security@w3.org
On 12/17/2013 10:38 PM, Richard Barnes wrote: > On Dec 17, 2013, at 4:31 PM, Harry Halpin <hhalpin@w3.org> wrote: > >> On 12/17/2013 10:28 PM, Richard Barnes wrote: >>> On the one hand, this is a “turtles all the way down” problem. If you’re going to verify JS with WebCrypto, you need to have JS to do the verification, and how does that get verified. >>> >>> On the other hand, if you do have clean verification JS, it seems like you could do this with JWS / WebCrypto very simply. >>> >>> var jws = { >>> “unprotected”: { “alg”: “RS256”, “jwk”: { ... } }, >>> “payload”: “... base64-encoded JavaScript ...”, >>> “signature”: “..." >>> }; >>> >>> var valid = jose.verify(jws); >>> /* Check that the key is one you trust */ >> It's exactly how we determine "what key is one we trust" in that comment where we need work :) > Really? I thought that would just be something like “in a cert that chains to a trust anchor”. Richard, see the Thandy approach, which I think a browser could use something similar: https://gitweb.torproject.org/thandy.git/blob_plain/HEAD:/specs/thandy-spec.txt > > In any case, if you load your scripts over HTTPS, there’s no additional security here. Either way, you’re assured that you got the script from the guy on the other end of the connection. What WebAppSec is doing (IIRC), is providing the web app loading the library a *countersignature*, which is directly opposed to the idea of upgradeability (since the countersignature won’t validate on the upgraded library). > > --Richard > > >>> eval(atob(jws.payload)); >>> >>> >>> >>> >>> On Dec 17, 2013, at 4:17 PM, Harry Halpin <hhalpin@w3.org> wrote: >>> >>>> I think some sort of signed Javascript solution could be very useful. Currently, on the Web we have a pretty straightforward same origin policy that assumes complete trust in the server. yet with the proliferation of third-party JS apps and the possibility of server being compromised, how do you know if the server has served the right JS? >>>> >>>> I think some approach involving signatures and repos of JS libraries (similar to repos in *nix) would help, along with some sort of network perspectives or trust anchor in the browser to double-check and verify the JS served by the server. >>>> >>>> I believe WebAppSec WG is working on something in this space. I'm personally a fan of the TUF/Thandy approach of Tor, and wonder if such an approach could be adopted to JS. Installing trusted code is a hard problem, and applies just as equally in JS as it does in any other language. Despite all the harm of XSS, the advantage of downloading the JS code (and forcing new code into the cache when necessary), JS does allow easy upgrade to avoid 0 days, but I'd like to see if we can increase the trust in JS even more. >>>> >>>> cheers, >>>> harry >>>> >>>>
Received on Tuesday, 17 December 2013 21:44:45 UTC