-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signed HTTP Exchanges #171
Comments
I don't like that this spec allows changing URL bar contents. If we look at Google's documentation on AMP Viewer, there is a screenshot where the URL bar displays "www.amp.dev" while in fact the content is fetched from Google's servers. The user might think that they are connecting to amp.dev but in fact they are connected to Google and Google is collecting their data including IP address according to their policy. I think the URL bar should show the real URL from which the content was loaded. The author of the spec mentions this:
But I don't understand why they call the URL of the cache "wrong". It is the actual URL, not wrong. The user connects to Google's servers via a TLS connection signed by Google's key. The address bar should display google.com in this case. |
Mozilla’s Position on Web Packaging
|
Discussion on IETF wpack list and at IETF 105 suggests a BOF at 106. |
Content-Based Origins for the Web
https://martinthomson.github.io/wpack-content/draft-thomson-wpack-content-origin.html#section-3.3
|
There is also this, which looks very close to the first option listed there: https://tools.ietf.org/html/draft-sporny-hashlink-04
Cc: @msporny |
Yes, that could be a partial solution that's backwards compatible and doesn't break the existing Web model by tacking on ?hl=XYZ to the URL; it's a bit of a hack. The other option, which is being picked up by IETF's HTTP WG is: ... which is capable of digitally signing HTTP headers from the server, which again, doesn't break the Web's security model but gives you the option of doing a HEAD, getting the content hash of what you should be receiving as well as who signed the content hash (original domain) and then you have options on where you get the content from. This is also backwards compatible with the security model of the Web. PS: Not taking a position on the Signed HTTP Exchanges discussion as I'm sure it would take me a week to catch up on the current status of that discussion. :) |
Here is an Assessment on value Per industry standards, certificates that include the Signed HTTP Exchange extension have a 90-day maximum validity limit. source Digicert charges $198 for an enabled certificate (this does not include an existing certificate you must have). That's $792 extra a year. Why even bother using domain names at all? Why not just let Google host everything? |
Use cases: https://wicg.github.io/webpackage/draft-yasskin-webpackage-use-cases.html
Explainer: https://github.com/WICG/webpackage/blob/master/explainer.md
As noted at https://www.chromestatus.com/feature/5745285984681984, representatives from both the Firefox dev team and Safari dev team has expressed unwillingness to implement:
The gist of the feedback is that the associated security considerations are serious to the degree that the Signed HTTP Exchanges feature is harmful:
See also #96
The text was updated successfully, but these errors were encountered: