0.0.100151 • Published 5 years ago

@mithray/hashtml v0.0.100151

Weekly downloads
1
License
GPL-3.0
Repository
github
Last release
5 years ago

HashTML

Contents

  1. Summary
  2. Basic Use(server side)
  3. Motivation
  4. Server Use
  5. Client Use
  6. Levels of Implementation
  7. Roadmap

Summary

Hashed and Signed Hypertext Markup Language

DISCLAIMER: Presently this repository contains cli application that performs a single function of hashing html components, nothing else has yet been implemented. It is not likely to be of use to anybody in production. So far it's mostly just a draft specification. See Roadmap to see what is planned in the scope of this project.

HashTML is a standard of secure HTML where every component of an HTML page has it's contents hashed and signed by a Public Key Infrastructure(PKI) of a contributing coding community of open source auditing coders. It follows the standard of World Wide Web Consortium's(W3C) subresource integrity for hashing the contents of external documents, but extends this standard to include signatures from the open source community and to components of HTML.

Basic Use(server side)

npm install --global @mithray/hashtml
hashtml main.html

Motivation

"But why?"

Currently well behaving Certificate Authorities(CAs) provide evidence that a web pages resources are indeed transferred safely between the server and the client. However, this is where the security provided by these HTTPS certificates stops. They do not provide public evidence of coding standards or the security of components, only the safe transmission of code. The W3C standard stops at requiring hashes, with no signatures, which means that the hash solves a very localized problem that does not take advantage of the profound increases in web security that would be enabled by an open source repository of signed web components.

Objection!!!!

"You can't sign hash and sign HTML Tags!!!! They change all the time!!!! No webpage is identical!!!"

It's true that no web page is identical( *cough* ...bootstrap), yet HashTML will perform a number of operations on the HTML component before hashing, to make the component more shareable. Examples of this are removing textContent from the HTML component, stripping whitespace, using a common, published standard for html minification, and stripping the web component's designer's choice of css variables from the hash. Ultimately, it will not be a lot different from the copying of design patterns which already happens. There will be less flexibilty in changing components, but your components can be signed in a build step and a single signature for the whole document is sufficient to meet the recommendation.

Server Use

basic html subresource hasher is implemented

The minification should either follow a specified standard of minification, or provide a link to a place where the minification rules are specified, so the user agents, or scripts for verification sent to the user, are able to minify the HashTML element and derive the hash and check the signatures automatically on the client side.

So far the process goes as follows: 1. Take/retrieve an HTML document or component 2. Identify each element of the html file with a class="hashtml" 3. InnerHTML is extracted from the parent component. 4. Remove textContent of that element 5. Remove Variables. 6. Remove Empty CSS Tags, ids, classes(standard css should be left in, as it hiding elements with css could have security vulnerabilities, instead, the component community should use variables to change the component styling) 7. Pass through html-minifier 8. Hash the minified component (and sign the hash, which is not implemented) 9. Add the hash to the original unminified component 10. Integrate the component into your app, including minifying any way you see fit for production

An example html component in step 1 from above may look like this:

<nav class="hashtml">
	<style>
		nav {
			--main-bg-color: rgb(40,40,40);
			--main-font-color: rgba(230,230,230,.8);
		}
		nav {
			background-color: var(--main-bg-color);
			color: var(--main-font-color);
		}
	</style>
	<ul>
		<li id="home">Home</li>
		<li id="about">About</li>
		<li id="contact">Contact</li>
	</ul>
</nav>

The resulting minified innerHTML of this component in step 7 will look something like below, note, there is no outer <nav> tag. The hashes and the signatures are added to the <nav> tag and therefore cannot be part of the hash.

<style>nav{background-color: var(--main-bg-color);color: var(--main-font-color);}</style><ul><li></li><li></li><li></li></ul>

The hash from step 8 is then taken and added to the original, unminified host element from step 2. in this example it is the <nav> tag.

<nav class="hash" integrity="f3bd8e3a82b..." signature="4ubkf7...">
	<style>
		nav {
			--main-bg-color: rgb(40,40,40);
			--main-font-color: rgba(230,230,230,.8);
		}
		nav {
			background-color: var(--main-bg-color);
			color: var(--main-font-color);
		}
	</style>
	<ul>
		<li id="home">Home</li>
		<li id="about">About</li>
		<li id="contact">Contact</li>
	</ul>
</nav>

The process is repeated for all elements identified in step 1. The output is then hashed (in the future signatures will be added) and ready to integrate into your app.

Client Use

not implemented

Verifying the hash and signature on client side could either produce an alert on failing to load, silently fail to load the resource, or could provide a fallback. In order for the client to verify the component, they perform the same operations that the server performs on the component, in order that they can generate the same hash, and then verify the attached signatures, which are likely to be stored online distributed databases such as distributed ledgers. Upon verifying hashes and signatures, the user-agent will then have a trust rating attached to the component that they can choose to accept or reject.

Levels of Implementation

L1 - Partial

At this level, an HTML document will contain some hashed and/or signed external resources, a partial implementation of W3C Standards. This should at least slightly increase the security.

L2 - W3C Compliant

To reach this level an HTML document must meet the W3C Standards for all external resources.

L3 - W3C Compliant & Signatures

To reach this level, an HTML document must be W3C compliant, as well as include signatures for all hashed components. The point at which multiple signatures begin being utilized is the point at which the wider open source community join together in collaborating toward improving web privacy and security.

L4 - HashTML Compliant

To be fully compliant, an HTML document must include at minimum a hash and a signature in it's HTML tag, but any child tags of the html tag may also be signed.

Roadmap

Server Use

The Server hashing and signing of components need to be easy enough that it is not a burden to developers to implement, otherwise it will not be done. This requires building hashing, and signing, of components from public repositories.

  •  hashing of components
  •  make the package available as a module(in addition to global cli tool)
  •  key management & use - interface to KMIP  creating keys  retrieving keys (publishing and retrieval of keys needs to be to a practical global url, such as described by W3Cs DID specification)  publishing keys  signing of components with private keys
  •  integration with component libraries

Client Use

A javascript script needs to be sent to users, integrated into a browser extension, or integrated into user-agent itself, this script will need to:

  •  minify components
  •  hash the minified component to check if the hash is the same
  •  verify the signatures against a public key infrastructure
  •  implement several alternative actions of how to manage trusted or untrusted components
  •  provide a usable interface that allows for user decision making
  •  key management & use - partial interface to KMIP  retrieving keys (publishing and retrieval of keys needs to be to a practical global url, such as described by W3Cs DID specification)  ?? publishing/saving keyscould be possible for user agents to help store keys with a decentralized database  ?? Could we use user agent verification of elements? creating keys  ?? signing of components with private keys