- From: Jeffrey Yasskin <jyasskin@google.com>
- Date: Fri, 22 Aug 2014 15:28:10 -0700
- To: Ángel González <angel@16bits.net>
- Cc: Mark Watson <watsonm@netflix.com>, Jim Manico <jim.manico@owasp.org>, "public-webappsec@w3.org" <public-webappsec@w3.org>
- Message-ID: <CANh-dXk6p9QYQnQWkTT=T5fx5kVsZ68fj1k1tDHHxj4+kwSMuw@mail.gmail.com>
On Fri, Aug 22, 2014 at 3:12 PM, Ángel González <angel@16bits.net> wrote: > Jeffrey Yasskin wrote: > > That's what I'm suggesting. I'm not sure whether "block ALL mixed > > content" or "block insecure access to user data" is the stronger push, > > but it seems like there's at least a chance that folks will be willing > > to keep a regulated hole in the mixed-content wall, especially if it > > makes it easier to adopt Chrome's secure-origins manifesto. > > > > I don't really know what the regulated hole should look like. What > > would you be happy with? > > The simplest hole is probably a url with a hash which must match the > content. Eg. like > http://en.wikipedia.org/wiki/Magnet_URI_scheme?oldid=622277458#cite_ref-4 > > I think I have also seen urls that used hashes appended after the # for > verification, but can't find them now. > So, roughly, allow requests under https://w3c.github.io/webappsec/specs/subresourceintegrity/, in whatever form that winds up, even if the origin is mixed. I'm not the person who'd need to be convinced that this approach is acceptable, but it seems like a reasonable way to get most of the user benefits of the secure origin proposal without forcing Netflix to spend lots of money in a hurry to replace their serving hardware. > > What if, instead, > > WebCrypto provided a direct way to open a WebSocket where each message > > is passed through decrypt() before being given to the user? > > That looks initially good as it would also provide confidentiality. > However, I'm afraid that you would end up having to spec a VM for how to > decrypt the message. IMHO the hole should only require integrity (hashes > or private key signatures). Decryption should be performed by WebCrypto > on top of that. But you will find that there will be cases where it's > not desired (eg. the download of a .deb or a Linux CD) and others where > it's not enough (the tracking could be perfomed on the encrypted file). > If you need to reencrypt for every user, you don't help the CDN use case > where they precisely want static files. The only benefit is that you > could encrypt offline the same content several times, and then serve > each user a different token (and file) to decrypt them. > Fair 'nuf.
Received on Friday, 22 August 2014 22:28:57 UTC