-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce 'connect-certificate-hash' for WebTransport #683
Comments
I have a couple of different concerns about how this integrates with CSP. Shape An alternative might be to create something like Purpose |
I may be misreading your proposal. The text says "keyword", but the semi-colon after the a.com host (plus the later b.com host) made I'm also unclear on what threat this is trying to address. WebTransport requires script, and if you have malicious script running on your page then CSP has already failed you. If it's about exfiltration then the hostname should be good enough, or at least as good as anything else CSP tries to protect. If you have a true MITM going on then the CSP itself could be modified or removed. This seems to address a very narrow case of an active network attacker who can re-route requests, can't modify the document/CSP on the network, but still has found a way to inject scripts into the victim page. |
From w3c/webtransport#59 (comment): WebTransport acts like fetch wrt
connect-src: https://A.com
for normal use like:But the API also allows websites to connect using custom hashes:
For this we think we need of a new CSP keyword, something like:
connect-certificate-hash: https://B.com/
e.g.The idea is:
connect-src
is absent, then custom certs are allowedconnect-src
is present,connect-certificate-hash
is needed to allow custom certsDoes this make sense? Can someone help us with this?
The text was updated successfully, but these errors were encountered: