Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Design questions for Signed Exchanges #354

Closed
1 of 3 tasks
jyasskin opened this issue Mar 24, 2019 · 9 comments
Closed
1 of 3 tasks

Design questions for Signed Exchanges #354

jyasskin opened this issue Mar 24, 2019 · 9 comments
Assignees
Labels
Progress: pending editor update TAG is waiting for a spec/explainer update Progress: propose closing we think it should be closed but are waiting on some feedback or consensus Topic: packaging Topic: privacy Topic: security features Venue: IETF Proposed at the IETF, but not in a specific working group Venue: WICG

Comments

@jyasskin
Copy link
Contributor

I'm requesting TAG input on some design questions we discussed at the 2019-02 Tokyo meeting. #235 is already closed, so I'm filing a new issue.

Questions:

  1. Do you have ideas to help ensure that web servers don't sign personalized content, which can allow various attacks?
    1. Does it make sense/help things to require that a signed exchange is fetched with credentials="omit"? This requires at least a new attribute on <a> tags to set its credentials mode and Fetch infrastructure to handle that on navigations.
  2. How would you trade off the extra security of validating content in real time vs the surveillance that allows?
  3. Similarly, do you have ideas on how best to notify a publisher that their certificate has signed such-and-such exchange, without revealing private information about who's reading the content? Purge mechanisms WICG/webpackage#376 could handle this ... by revealing that private information.

We'd prefer the TAG provide feedback as (please select one):

  • open issues in our Github repo for each point of feedback
  • open a single issue in our Github repo for the entire review
  • leave review feedback as a comment in this issue and @-notify [github usernames]
@ylafon ylafon self-assigned this May 8, 2019
@jyasskin
Copy link
Contributor Author

jyasskin commented May 8, 2019

WICG/webpackage#424 tries to record the threat model that Safari's using to prevent tracking. It would be useful to have an anti-tracking threat model at the TAG level so we could analyze platform features in a consistent way. @hober, are you at all interested in helping to drive that?

@hober
Copy link
Contributor

hober commented May 8, 2019

It would be useful to have an anti-tracking threat model at the TAG level so we could analyze platform features in a consistent way. @hober, are you at all interested in helping to drive that?

I think such an effort would be better driven by someone for whom this is an area of expertise.

@kenchris kenchris removed this from the 2019-05-21-f2f-reykjavík milestone May 22, 2019
@hober hober added Venue: IETF Proposed at the IETF, but not in a specific working group Progress: in progress Topic: privacy Topic: security features labels May 22, 2019
@rektide rektide mentioned this issue Jul 22, 2019
5 tasks
@torgo torgo added this to the 2019-09-10-f2f-tokyo milestone Sep 10, 2019
@torgo
Copy link
Member

torgo commented Sep 10, 2019

Discussed at Tokyo f2f....

@torgo
Copy link
Member

torgo commented Sep 10, 2019

We discussed and requested some further info on the relevant flows - maybe some flowcharts.. There will also be a breakout on this topic at TPAC.

@torgo torgo added the Progress: pending editor update TAG is waiting for a spec/explainer update label Dec 3, 2019
@torgo
Copy link
Member

torgo commented Dec 3, 2019

Hi @jyasskin - We're just picking this up again at our f2f and I see we haven't got any further info from you on documenting the flows. Considering it's been a few months, could you let us know status on this? Is this something where you still need TAG advice / feedback and if so, could you indicate what specific areas you are looking for feedback on? Considering @hober's comment above maybe we should close this issue for now?

@torgo torgo added Progress: propose closing we think it should be closed but are waiting on some feedback or consensus and removed Progress: in progress labels Dec 3, 2019
@ylafon
Copy link
Member

ylafon commented Dec 3, 2019

Also, regarding WICG/webpackage#376 do you need a 'stale' state there, so that mechanism like stale-while-revalidate but adapted to signed exchanges would fit the invalidation use-case? I would imagine that a revalidation would reset the staleness state of the content, to void checking too often and revealing information about the reader.

@alice alice removed this from the 2019-12-03-f2f-cupertino milestone Jan 27, 2020
@torgo torgo added this to the 2020-03-03-f2f-wellington milestone Mar 2, 2020
@torgo
Copy link
Member

torgo commented Mar 2, 2020

Hi @jyasskin we're just coming back to this and we haven't had any updates since December, but I do see that there have been some recent updates to the specs... Can you please leave an update here also addressing the question I asked on 3-December, above? If there's no feedback you're currently waiting for from the TAG then maybe we should close this issue? We're in the middle of our f2f this week and I'd like to close this issue now unless you we hear from you.

@torgo
Copy link
Member

torgo commented Mar 11, 2020

Based on feedback from @jyasskin we're going to close this for now. As discussed, please re-open when there is something new for us to take a look at. Thanks!

@torgo torgo closed this as completed Mar 11, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Progress: pending editor update TAG is waiting for a spec/explainer update Progress: propose closing we think it should be closed but are waiting on some feedback or consensus Topic: packaging Topic: privacy Topic: security features Venue: IETF Proposed at the IETF, but not in a specific working group Venue: WICG
Projects
None yet
Development

No branches or pull requests

8 participants