LGTM1, can we get SRI for images next? ;-)

Best,

Alex

On Wednesday, August 13, 2025 at 3:37:10 AM UTC-7 Chromestatus wrote:

> Contact emails mk...@chromium.org 
>
> Explainer https://github.com/WICG/signature-based-sri 
>
> Specification https://wicg.github.io/signature-based-sri 
>
> Summary 
>
> This feature provides web developers with a mechanism to verify the 
> provenance of resources they depend upon, creating a technical foundation 
> for trust in a site's dependencies. In short: servers can sign responses 
> with a Ed25519 key pair, and web developers can require the user agent to 
> verify the signature using a specific public key. This offers a helpful 
> addition to URL-based checks offered by Content Security Policy on the one 
> hand, and Subresource Integrity's content-based checks on the other.
>
>
> Blink component Blink>SecurityFeature>Subresource Integrity 
> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3ESecurityFeature%3ESubresource%20Integrity%22>
>  
>
> Search tags sri <http:///features#tags:sri>, signature 
> <http:///features#tags:signature>, ed25519 <http:///features#tags:ed25519>, 
> integrity <http:///features#tags:integrity>, provenance 
> <http:///features#tags:provenance> 
>
> TAG review https://github.com/w3ctag/design-reviews/issues/1041 
>
> TAG review status Pending 
>
> Origin Trial Name Signature-based SRI 
>
> Chromium Trial Name SignatureBasedIntegrity 
>
> Origin Trial documentation link 
> https://github.com/WICG/signature-based-sri 
>
> WebFeature UseCounter name kSRIPublicKeyAssertion 
>
> Risks 
>
>
> Interoperability and Compatibility 
>
> None
>
>
> *Gecko*: No signal (
> https://github.com/mozilla/standards-positions/issues/1139) 
>
> *WebKit*: Support (
> https://github.com/WebKit/standards-positions/issues/434) 
>
> *Web developers*: No signals Shopify (@yoavweiss) has expressed positive 
> initial impressions, as have folks at Cloudflare and Google. 
>
> *Other signals*: 
>
> Ergonomics 
>
> The hash functions we currently support for SRI generally are not 
> conducive to streaming responses. This is arguably fine for scripts and 
> stylesheets (as those are executed atomically, requiring the entire body), 
> but it cannot work for other resource types (images, video, etc). It's 
> likely we'll want to extend the set of hash functions in the future (though 
> we'd do that for SRI, CSP, and this mechanism in one fell swoop).
>
>
> Activation 
>
> None.
>
>
> Security 
>
> The feature aims to plug a security hole in the platform's status quo 
> ante: it is impossible to deploy content-based integrity checks for dynamic 
> resources, and URL-based checks are too broad to provide meaningful 
> security protections. We continue to require CORS-based opt-in for 
> integrity checks on responses to ensure that we're not leaking data 
> unintentionally between origins.
>
>
> WebView application risks 
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> None
>
>
> Debuggability 
>
> `Signature` and `Signature-Input` header parsing and validation is 
> well-covered with DevTools issues. The same is true for `Unencoded-Digest` 
> parsing and enforcement.
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac, 
> Linux, ChromeOS, Android, and Android WebView)? Yes 
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ? Yes 
>
>
> https://wpt.fyi/results/subresource-integrity/unencoded-digest?label=experimental&label=master&aligned
>  
> https://wpt.fyi/results/subresource-integrity/signatures?label=experimental&label=master&aligned
>
>
> Flag name on about://flags signature-based-sri 
>
> Finch feature name SignatureBasedIntegrity 
>
> Rollout plan Will ship enabled for all users 
>
> Requires code in //chrome? False 
>
> Tracking bug https://issues.chromium.org/issues/375224898 
>
> Estimated milestones 
> Shipping on desktop 141 
> Origin trial desktop first 135 
> Origin trial desktop last 141 
> Shipping on Android 141 
> Origin trial Android first 135 
> Origin trial Android last 141 
> Shipping on WebView 141 
> Origin trial WebView first 135 
> Origin trial WebView last 141 
>
> Anticipated spec changes 
>
> Open questions about a feature may be a source of future web compat or 
> interop issues. Please list open issues (e.g. links to known github issues 
> in the project for the feature specification) whose resolution may 
> introduce web compat/interop risk (e.g., changing to naming or structure of 
> the API in a non-backward-compatible way).
> None 
>
> Link to entry on the Chrome Platform Status 
> https://chromestatus.com/feature/5032324620877824?gate=5079751293927424 
>
> Links to previous Intent discussions Intent to Prototype: 
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6753088f.2b0a0220.1432c2.020a.GAE%40google.com
>  
> Intent to Experiment: 
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/67b8a89e.2b0a0220.175b17.0a0c.GAE%40google.com
>  
>
>
> This intent message was generated by Chrome Platform Status 
> <https://chromestatus.com>. 
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/72bb8a89-b061-4fec-b433-f1891418378fn%40chromium.org.

Reply via email to