be-hashing-out
v0.0.2
Published
Elevate the trust level of HTML Fragments.
Downloads
9
Maintainers
Readme
be-hashing-out
Elevate the trust level of HTML Fragments.
The catch-22 of web development
Enabling unfettered JavaScript unintentionally in the browser can be dangerous, as it allows XSS attacks. Therefore, (in addition to performance and accessibility reasons), use less JavaScript, more HTML. However, if the HTML contains any explicit JavaScript in the event handlers, you're back to square one since the browser won't support you with nonce/hash, and script tags can't identify where in the DOM it is. So.... just give up and write the whole thing in JavaScript.
be-hashing-out can't help but long for the the brevity and sorcery on display here:
<form oninput="result.value=parseInt(a.value)+parseInt(b.value)">
<input type=range id=a name=a value=50>
+<input type=number id=b name=b value=25>
=<output name=result for="a b"></output>
</form>
This example was also formerly shared with MDN, but MDN abandoned simplicity for seemingly nonce-sensical security reasons (perhaps I'm wrong, thinking this out, which is what this repo is currently).
Due to a lack of -- I'm not sure what -- the platform engineers have apparently failed to find a way to support brevity like this, even for trusted content coming from the host -- i.e. most "minimal" security measures throw the baby out with the bathwater, blocking our ability to do this (sigh). How could they have supported it? I think by allowing the nonce / hash attribute to apply to the parent element that contains inline scripts. Maybe that was looked at and found problematic, who knows? All I know is it is deeply unfortunate, and it appears to be resulting in solutions adopting makeshift handler syntax that is probably just as vulnerable to similar attacks as the native inline handlers are, only reduced by lack of widespread adoption. And not solving this problem appears to me to driving a stake through the idea of progressive enhancement.
Security concerns - Nonce in userland?
Step 1
<fetch-for be-hashing-out
href=https://cors-anywhere.herokuapp.com/https://www.theonion.com/
as=html shadow=open ></fetch-for>
What the be-hashing-out enhancement does: Since the value of the be-hashing-out attribute is empty, it emits a console.error with the expected SubtleCrypto.digest value, based on the attribute values (excluding the be-hashing-out attribute itself).
The console looks like:
Suggested markup:
<script type=module>
import {register} from 'be-hashing-out/register.js';
register('d61df4e4896765173a31dd0685866f0106c9b2b803f00096140d46e2e0dadc4f');
</script>
Suggested Attr: be-hashing-out="d61df4e4896765173a31dd0685866f0106c9b2b803f00096140d46e2e0dadc4f"
Step 2
Based on what is seen in the console, update the markup:
<script type=module>
import {register} from 'be-hashing-out/register.js';
register('d61df4e4896765173a31dd0685866f0106c9b2b803f00096140d46e2e0dadc4f');
</script>
<fetch-for be-hashing-out=d61df4e4896765173a31dd0685866f0106c9b2b803f00096140d46e2e0dadc4f
href=https://cors-anywhere.herokuapp.com/https://www.theonion.com/
as=html shadow=open ></fetch-for>
What be-hashing-out does with the above markup, now that it contains a non trivial be-hashing-out value:
- Forms a string from the attributes other than be-hashing-out of the element it adorns just like before.
- Calculates the digest just like before.
- Verifies that the value was registered, and the value matches the value of the be-hashing-out attribute.
- If everything is in order, sets properties:
- oFetchFor.beEnhanced.beHashingOut.resolved to true.
- oFetchFor.beEnhanced.beHashingOut.rejected to false.
- If the values don't match, or the value isn't registered, sets properties:
- oFetchFor.beEnhanced.beHashingOut.rejected to true.
- oFetchFor.beEnhanced.beHashingOut.resolved to false.
- If either case, two events with types "resolved" and "rejected" are dispatched.
Who cares?
This enhancement doesn't do much by itself. It is quietly providing information that it thinks will be useful to others. And "who" are those others that would find this information useful?
At least two third parties would find it useful for now.
- Custom Elements that support attributes that could allow for XSS attacks from untrusted third-party (or user supplied) HTML
- Custom Enhancements that similarly support such attributes.
So what these custom elements / enhancements can do is:
- Attach this be-hashing-out enhancement (if not already attached -- which the be-enhanced functionality already accounts for):
const {emc} = await import('be-hashing-out/emc.js');
const beHashingOut = oFetchFor.beEnhanced.whenResolved(emc);
let everyIsOkay = false;
if(beHashingOut.resolved){
//for custom elements do this
if(beHashingOut.confirm(FetchFor.observedAttributes)){
everyIsOkay = true;
}
//for custom enhancements to this
if(beHashingOut.confirm(/** tbd **/)){
everyIsOkay = true;
}
}
Viewing Locally
Any web server that serves static files will do but...
- Install git.
- Fork/clone this repo.
- Install node.
- Open command window to folder where you cloned this repo.
npm install
npm run serve
- Open http://localhost:3030/demo in a modern browser.
Importing in ES Modules:
import 'be-hashing-out/be-hashing-out.js';
Using from CDN:
<script type=module crossorigin=anonymous>
import 'https://esm.run/be-hashing-out';
</script>