- From: Richard Barnes <rbarnes@mozilla.com>
- Date: Wed, 16 Mar 2016 16:04:32 -0400
- To: Neil Matatall <oreoshake@github.com>
- Cc: Patrick Toomey <patrick.toomey@github.com>, Frederik Braun <fbraun@mozilla.com>, "public-webappsec@w3.org" <public-webappsec@w3.org>
- Message-ID: <CAOAcki-3rvkoaNkM6tqyaX3_C2tN4f6bTNYj0Y+n8kwf2sOO5g@mail.gmail.com>
That approach seems sensible to me, assuming the syntax can be made to work. On Wed, Mar 16, 2016 at 2:30 PM, Neil Matatall <oreoshake@github.com> wrote: > Another option to support the asset type granularity would be to make > a `require-sri` source expression that can be added to script-src, > style-src, img-src, media-src, and unicorn-src. > > On Wed, Mar 16, 2016 at 7:18 AM, Neil Matatall <oreoshake@github.com> > wrote: > > What can we do to get this moving? No matter the form, I don't think > > there's any disagreement about whether or not this is valuable. We're > > starting to see a proliferation of SRI attributes included in example > > snippets for 3rd party assets. It's my gut instinct* that SRI has the > > possibility of eclipsing CSP in terms of adoption, but that's a > > different topic. It sounds like CSP bloat and SRI changes are the > > biggest hurdles. Something that may alleviate both concerns: > > > > block-non-sri-resources: stylesheets, scripts(, images, videos, > unicorns) > > > > I would still love to see this as a part of CSP, especially if we're > > talking about adding something related to noopener > > https://twitter.com/mikewest/status/710025892970504193. Maybe this > > separate header value can also work as a directive, just remove [:,] > > > > * I'll take bets > > > > On Tue, Feb 16, 2016 at 5:44 AM, Patrick Toomey > > <patrick.toomey@github.com> wrote: > >> On Wed, Feb 10, 2016 at 7:47 AM Frederik Braun <fbraun@mozilla.com> > wrote: > >>> > >>> On 09.02.2016 19:35, Craig Francis wrote: > >>> > I'm forgetting the discussion a bit, but CSP already gives us: > >>> > > >>> > block-all-mixed-content > >>> > upgrade-insecure-requests > >>> > > >>> > Maybe we could keep it as just one directive: > >>> > > >>> > block-non-sri-resources > >>> > > >>> > Or am I missing the more advanced cases like saying SRI is required > for > >>> > all JavaScript files, but not on CSS (doubt that is useful, as you > might > >>> > as well do both)... or maybe in the future SRI could be added to > images, > >>> > video, etc? > >>> > >>> We'd need to think about compatibility assuming SRI will expand to > other > >>> tags. > >>> > >>> I would be surprised if nobody wanted a report-mode and a block-mode > and > >>> a way to specify which subresources/elements should be subject to the > >>> policy. (The list of elements could be abbreviated with a short-hand > >>> form, e.g., "sri-v1" meaning scripts & styles.) > >>> > >>> I guess this level of complexity (and Mark Nottingham's comment about > >>> HPACK and entropy) warrants its own header? > >>> > >> > >> I'm curious where the line should be drawn between extending CSP and > adding > >> a new header? Not having been involved with CSP from day one, maybe > this has > >> already been discussed. But, I feel like CSP is a natural place to > >> centralize on browser based security policies (like x-frame-options > >> migrating to frame-ancestors). Adding a new header for each and every > new > >> good idea for browser security doesn't seem to scale. As has been > mentioned > >> in this thread prior, it feels like we are starting to bump up against > >> practical size consideration issues. Whether the CSP header itself > grows too > >> large or we end up adding 50 headers to each HTTP response, there is an > >> issue of bloat. It would be a shame to place some artificial cap on good > >> ideas based on concerns for adding too many new headers and/or > stretching > >> the size of the CSP header. I personally feel like moving toward a > >> centralized policy/manifest/resource sounds like the best way to handle > >> this, but I think most of that discussion is best had over in the > "header > >> size and policy delivery" thread. I just wanted to bring it up here > since I > >> think the "where do we put it" discussion should be deferred until > later, > >> since it seems like this is a general concern for almost anything new > that > >> is proposed. > >
Received on Wednesday, 16 March 2016 20:05:01 UTC