On Sat, Feb 7, 2015 at 4:38 PM, Eric Mill <eric@konklone.com> wrote:
> The thought this brought to mind was that it'd be best done at the server
> _proxy_ level, a bit like Google's page_speed module. For example, a
> CloudFlare switch might use it to rewrote the page to use static resource
> links before caching it at their edge nodes.
>
Yes. I agree that this is something the page_speed team (and other, similar
products) ought to be looking into. The general issue with middleware,
however, is that it doesn't understand which pieces of your site are
intentionally loading script, and which scripts have been maliciously
injected. That is, page_speed will be hard-pressed to prevent XSS attacks
in the same way a pinned policy could.
> That wouldn't cover dynamic references, like XHRs triggered from
> JavaScript -- but that's fine, because HSTS _will_ cover those.
>
I think we're mixing conversations here. Brian's comment was focused on
pinning a CSP for a site which didn't otherwise send a
`Content-Security-Policy` header. The other set of threads is focused on
upgrading first- and third-party resource requests. :)
-mike
--
Mike West <mkwst@google.com>, @mikewest
Google Germany GmbH, Dienerstrasse 12, 80331 München,
Germany, Registergericht und -nummer: Hamburg, HRB 86891, Sitz der
Gesellschaft: Hamburg, Geschäftsführer: Graham Law, Christine Elizabeth
Flores
(Sorry; I'm legally required to add this exciting detail to emails. Bleh.)