LGTM2

On Wednesday, August 13, 2025 at 8:14:58 AM UTC-7 sligh...@chromium.org 
wrote:

> LGTM1, can we get SRI for images next? ;-)
>
> Best,
>
> Alex
>
> On Wednesday, August 13, 2025 at 3:37:10 AM UTC-7 Chromestatus wrote:
>
>> Contact emails mk...@chromium.org 
>>
>> Explainer https://github.com/WICG/signature-based-sri 
>>
>> Specification https://wicg.github.io/signature-based-sri 
>>
>> Summary 
>>
>> This feature provides web developers with a mechanism to verify the 
>> provenance of resources they depend upon, creating a technical foundation 
>> for trust in a site's dependencies. In short: servers can sign responses 
>> with a Ed25519 key pair, and web developers can require the user agent to 
>> verify the signature using a specific public key. This offers a helpful 
>> addition to URL-based checks offered by Content Security Policy on the one 
>> hand, and Subresource Integrity's content-based checks on the other.
>>
>>
>> Blink component Blink>SecurityFeature>Subresource Integrity 
>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3ESecurityFeature%3ESubresource%20Integrity%22>
>>  
>>
>> Search tags sri <http:///features#tags:sri>, signature 
>> <http:///features#tags:signature>, ed25519 
>> <http:///features#tags:ed25519>, integrity 
>> <http:///features#tags:integrity>, provenance 
>> <http:///features#tags:provenance> 
>>
>> TAG review https://github.com/w3ctag/design-reviews/issues/1041 
>>
>> TAG review status Pending 
>>
>> Origin Trial Name Signature-based SRI 
>>
>> Chromium Trial Name SignatureBasedIntegrity 
>>
>> Origin Trial documentation link 
>> https://github.com/WICG/signature-based-sri 
>>
>> WebFeature UseCounter name kSRIPublicKeyAssertion 
>>
>> Risks 
>>
>>
>> Interoperability and Compatibility 
>>
>> None
>>
>>
>> *Gecko*: No signal (
>> https://github.com/mozilla/standards-positions/issues/1139) 
>>
>> *WebKit*: Support (
>> https://github.com/WebKit/standards-positions/issues/434) 
>>
>> *Web developers*: No signals Shopify (@yoavweiss) has expressed positive 
>> initial impressions, as have folks at Cloudflare and Google. 
>>
>> *Other signals*: 
>>
>> Ergonomics 
>>
>> The hash functions we currently support for SRI generally are not 
>> conducive to streaming responses. This is arguably fine for scripts and 
>> stylesheets (as those are executed atomically, requiring the entire body), 
>> but it cannot work for other resource types (images, video, etc). It's 
>> likely we'll want to extend the set of hash functions in the future (though 
>> we'd do that for SRI, CSP, and this mechanism in one fell swoop).
>>
>>
>> Activation 
>>
>> None.
>>
>>
>> Security 
>>
>> The feature aims to plug a security hole in the platform's status quo 
>> ante: it is impossible to deploy content-based integrity checks for dynamic 
>> resources, and URL-based checks are too broad to provide meaningful 
>> security protections. We continue to require CORS-based opt-in for 
>> integrity checks on responses to ensure that we're not leaking data 
>> unintentionally between origins.
>>
>>
>> WebView application risks 
>>
>> Does this intent deprecate or change behavior of existing APIs, such that 
>> it has potentially high risk for Android WebView-based applications?
>>
>> None
>>
>>
>> Debuggability 
>>
>> `Signature` and `Signature-Input` header parsing and validation is 
>> well-covered with DevTools issues. The same is true for `Unencoded-Digest` 
>> parsing and enforcement.
>>
>>
>> Will this feature be supported on all six Blink platforms (Windows, Mac, 
>> Linux, ChromeOS, Android, and Android WebView)? Yes 
>>
>> Is this feature fully tested by web-platform-tests 
>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>> ? Yes 
>>
>>
>> https://wpt.fyi/results/subresource-integrity/unencoded-digest?label=experimental&label=master&aligned
>>  
>> https://wpt.fyi/results/subresource-integrity/signatures?label=experimental&label=master&aligned
>>
>>
>> Flag name on about://flags signature-based-sri 
>>
>> Finch feature name SignatureBasedIntegrity 
>>
>> Rollout plan Will ship enabled for all users 
>>
>> Requires code in //chrome? False 
>>
>> Tracking bug https://issues.chromium.org/issues/375224898 
>>
>> Estimated milestones 
>> Shipping on desktop 141 
>> Origin trial desktop first 135 
>> Origin trial desktop last 141 
>> Shipping on Android 141 
>> Origin trial Android first 135 
>> Origin trial Android last 141 
>> Shipping on WebView 141 
>> Origin trial WebView first 135 
>> Origin trial WebView last 141 
>>
>> Anticipated spec changes 
>>
>> Open questions about a feature may be a source of future web compat or 
>> interop issues. Please list open issues (e.g. links to known github issues 
>> in the project for the feature specification) whose resolution may 
>> introduce web compat/interop risk (e.g., changing to naming or structure of 
>> the API in a non-backward-compatible way).
>> None 
>>
>> Link to entry on the Chrome Platform Status 
>> https://chromestatus.com/feature/5032324620877824?gate=5079751293927424 
>>
>> Links to previous Intent discussions Intent to Prototype: 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6753088f.2b0a0220.1432c2.020a.GAE%40google.com
>>  
>> Intent to Experiment: 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67b8a89e.2b0a0220.175b17.0a0c.GAE%40google.com
>>  
>>
>>
>> This intent message was generated by Chrome Platform Status 
>> <https://chromestatus.com>. 
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/0f48ef05-9d94-4fd1-9009-681bedc9f200n%40chromium.org.

Reply via email to