LGTM1, can we get SRI for images next? ;-) Best,
Alex On Wednesday, August 13, 2025 at 3:37:10 AM UTC-7 Chromestatus wrote: > Contact emails mk...@chromium.org > > Explainer https://github.com/WICG/signature-based-sri > > Specification https://wicg.github.io/signature-based-sri > > Summary > > This feature provides web developers with a mechanism to verify the > provenance of resources they depend upon, creating a technical foundation > for trust in a site's dependencies. In short: servers can sign responses > with a Ed25519 key pair, and web developers can require the user agent to > verify the signature using a specific public key. This offers a helpful > addition to URL-based checks offered by Content Security Policy on the one > hand, and Subresource Integrity's content-based checks on the other. > > > Blink component Blink>SecurityFeature>Subresource Integrity > <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3ESecurityFeature%3ESubresource%20Integrity%22> > > > Search tags sri <http:///features#tags:sri>, signature > <http:///features#tags:signature>, ed25519 <http:///features#tags:ed25519>, > integrity <http:///features#tags:integrity>, provenance > <http:///features#tags:provenance> > > TAG review https://github.com/w3ctag/design-reviews/issues/1041 > > TAG review status Pending > > Origin Trial Name Signature-based SRI > > Chromium Trial Name SignatureBasedIntegrity > > Origin Trial documentation link > https://github.com/WICG/signature-based-sri > > WebFeature UseCounter name kSRIPublicKeyAssertion > > Risks > > > Interoperability and Compatibility > > None > > > *Gecko*: No signal ( > https://github.com/mozilla/standards-positions/issues/1139) > > *WebKit*: Support ( > https://github.com/WebKit/standards-positions/issues/434) > > *Web developers*: No signals Shopify (@yoavweiss) has expressed positive > initial impressions, as have folks at Cloudflare and Google. > > *Other signals*: > > Ergonomics > > The hash functions we currently support for SRI generally are not > conducive to streaming responses. This is arguably fine for scripts and > stylesheets (as those are executed atomically, requiring the entire body), > but it cannot work for other resource types (images, video, etc). It's > likely we'll want to extend the set of hash functions in the future (though > we'd do that for SRI, CSP, and this mechanism in one fell swoop). > > > Activation > > None. > > > Security > > The feature aims to plug a security hole in the platform's status quo > ante: it is impossible to deploy content-based integrity checks for dynamic > resources, and URL-based checks are too broad to provide meaningful > security protections. We continue to require CORS-based opt-in for > integrity checks on responses to ensure that we're not leaking data > unintentionally between origins. > > > WebView application risks > > Does this intent deprecate or change behavior of existing APIs, such that > it has potentially high risk for Android WebView-based applications? > > None > > > Debuggability > > `Signature` and `Signature-Input` header parsing and validation is > well-covered with DevTools issues. The same is true for `Unencoded-Digest` > parsing and enforcement. > > > Will this feature be supported on all six Blink platforms (Windows, Mac, > Linux, ChromeOS, Android, and Android WebView)? Yes > > Is this feature fully tested by web-platform-tests > <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> > ? Yes > > > https://wpt.fyi/results/subresource-integrity/unencoded-digest?label=experimental&label=master&aligned > > https://wpt.fyi/results/subresource-integrity/signatures?label=experimental&label=master&aligned > > > Flag name on about://flags signature-based-sri > > Finch feature name SignatureBasedIntegrity > > Rollout plan Will ship enabled for all users > > Requires code in //chrome? False > > Tracking bug https://issues.chromium.org/issues/375224898 > > Estimated milestones > Shipping on desktop 141 > Origin trial desktop first 135 > Origin trial desktop last 141 > Shipping on Android 141 > Origin trial Android first 135 > Origin trial Android last 141 > Shipping on WebView 141 > Origin trial WebView first 135 > Origin trial WebView last 141 > > Anticipated spec changes > > Open questions about a feature may be a source of future web compat or > interop issues. Please list open issues (e.g. links to known github issues > in the project for the feature specification) whose resolution may > introduce web compat/interop risk (e.g., changing to naming or structure of > the API in a non-backward-compatible way). > None > > Link to entry on the Chrome Platform Status > https://chromestatus.com/feature/5032324620877824?gate=5079751293927424 > > Links to previous Intent discussions Intent to Prototype: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6753088f.2b0a0220.1432c2.020a.GAE%40google.com > > Intent to Experiment: > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67b8a89e.2b0a0220.175b17.0a0c.GAE%40google.com > > > > This intent message was generated by Chrome Platform Status > <https://chromestatus.com>. > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/72bb8a89-b061-4fec-b433-f1891418378fn%40chromium.org.