@@ -54,8 +54,8 @@ Scripts, of course, are not the only response type which would benefit
54
54
from integrity validation. The scheme specified here also applies to ` link `
55
55
and future versions of the specification are likely to expand this coverage.
56
56
57
- [ HSTS ] : http ://tools.ietf.org/html/rfc6797
58
- [ pinned public keys ] : http ://tools.ietf.org/html/draft-ietf-websec-key-pinning
57
+ [ HSTS ] : https ://tools.ietf.org/html/rfc6797
58
+ [ pinned public keys ] : https ://tools.ietf.org/html/rfc7469
59
59
60
60
<section >
61
61
### Goals
@@ -127,11 +127,11 @@ The term <dfn>origin</dfn> is defined in the Origin specification.
127
127
[[ !RFC6454]]
128
128
129
129
The terms <dfn >secure document</dfn > and
130
- <dfn >secure context</dfn > are defined in [ section 2 of the Secure
130
+ <dfn >secure context</dfn > are defined in section 2 of the [ Secure
131
131
Contexts] [ securecontext ] specification. An example of a secure document is a
132
132
document loaded over HTTPS. A counterexample is a document loaded over HTTP.
133
133
134
- [ securecontext ] : https ://w3c.github.io/webappsec/specs/powerfulfeatures/#terms
134
+ [ securecontext ] : http ://www.w3.org/TR/powerful-features/
135
135
[ secure context ] : #dfn-secure-context
136
136
[ secure document ] : #dfn-secure-document
137
137
@@ -145,17 +145,17 @@ is an origin whose scheme component is <code>HTTPS</code>.
145
145
The <dfn >message body</dfn > and the <dfn >transfer encoding</dfn > of a resource
146
146
are defined by [ RFC7230, section 3] [ messagebody ] . [[ !RFC7230]]
147
147
148
- [ messagebody ] : http ://tools.ietf.org/html/rfc7230#section-3
148
+ [ messagebody ] : https ://tools.ietf.org/html/rfc7230#section-3
149
149
150
150
The <dfn >representation data</dfn > and <dfn >content encoding</dfn > of a resource
151
151
are defined by [ RFC7231, section 3] [ representationdata ] . [[ !RFC7231]]
152
152
153
- [ representationdata ] : http ://tools.ietf.org/html/rfc7231#section-3
153
+ [ representationdata ] : https ://tools.ietf.org/html/rfc7231#section-3
154
154
155
155
A <dfn >base64 encoding</dfn > is defined in [ RFC 4648, section 4] [ base64 ] .
156
156
[[ !RFC4648]]
157
157
158
- [ base64 ] : http ://tools.ietf.org/html/rfc4648#section-4
158
+ [ base64 ] : https ://tools.ietf.org/html/rfc4648#section-4
159
159
160
160
The <dfn >SHA-256</dfn >, <dfn >SHA-384</dfn >, and <dfn >SHA-512</dfn > are part
161
161
of the <dfn >SHA-2</dfn > set of cryptographic hash functions defined by the
@@ -223,8 +223,8 @@ result of the following command line:
223
223
224
224
echo -n "alert('Hello, world.');" | openssl dgst -sha256 -binary | openssl enc -base64 -A
225
225
226
- [ csp2-section42 ] : http://www.w3.org/TR/CSP11 /#source-list-syntax
227
- [ openssl ] : http ://www.openssl.org/
226
+ [ csp2-section42 ] : http://www.w3.org/TR/CSP2 /#source-list-syntax
227
+ [ openssl ] : https ://www.openssl.org/
228
228
</div >
229
229
230
230
[ sha2 ] : #dfn-sha-2
@@ -341,8 +341,8 @@ only deliver integrity metadata on a [potentially secure origin][]. See
341
341
342
342
{:.note}
343
343
344
- [ uri-origin ] : http ://tools.ietf.org/html/rfc6454#section-4
345
- [ Non-secure contexts remain non-secure ] : #non-secure-contexts-remain-non-secure-1
344
+ [ uri-origin ] : https ://tools.ietf.org/html/rfc6454#section-4
345
+ [ Non-secure contexts remain non-secure ] : #non-secure-contexts-remain-non-secure
346
346
347
347
The following algorithm details these restrictions:
348
348
@@ -359,8 +359,8 @@ fetch failed the CORS checks, it won't be available to us for integrity
359
359
checking because it won't have loaded successfully.
360
360
{:.note}
361
361
362
- [ fetch-mode ] : http ://fetch.spec.whatwg.org/#concept-request-mode
363
- [ fetch-origin ] : http ://fetch.spec.whatwg.org/#concept-request-origin
362
+ [ fetch-mode ] : https ://fetch.spec.whatwg.org/#concept-request-mode
363
+ [ fetch-origin ] : https ://fetch.spec.whatwg.org/#concept-request-origin
364
364
</section ><!-- Algorithms::eligible -->
365
365
<section >
366
366
#### Parse <var >metadata</var >.
@@ -450,7 +450,7 @@ SHA256 hash value.
450
450
User agents may allow users to modify the result of this algorithm via user
451
451
preferences, bookmarklets, third-party additions to the user agent, and other
452
452
such mechanisms. For example, redirects generated by an extension like
453
- [ HTTPSEverywhere ] ( https://www.eff.org/https-everywhere ) could load and execute
453
+ [ HTTPS Everywhere ] ( https://www.eff.org/https-everywhere ) could load and execute
454
454
correctly, even if the HTTPS version of a resource differs from the HTTP
455
455
version.
456
456
{:.note}
@@ -668,8 +668,8 @@ To help inform intermediate servers, those serving the resources SHOULD
668
668
send along with the resource a [ ` Cache-Control ` ] [ cachecontrol ] header
669
669
with a value of [ ` no-transform ` ] [ notransform ] .
670
670
671
- [ cachecontrol ] : http ://tools.ietf.org/html/rfc7234#section-5.2
672
- [ notransform ] : http ://tools.ietf.org/html/rfc7234#section-5.2.1.6
671
+ [ cachecontrol ] : https ://tools.ietf.org/html/rfc7234#section-5.2
672
+ [ notransform ] : https ://tools.ietf.org/html/rfc7234#section-5.2.1.6
673
673
674
674
</section ><!-- /Implementation -->
675
675
@@ -693,7 +693,7 @@ algorithms as defined in [section 5 of the Mixed
693
693
Content] [ mixedcontent-algorithms ]
694
694
specification.
695
695
696
- [ Securing the Web ] : https ://w3ctag.github.io/ web-https/
696
+ [ Securing the Web ] : http ://www.w3.org/2001/tag/doc/ web-https
697
697
[ mixedcontent-algorithms ] : http://www.w3.org/TR/mixed-content/#algorithms
698
698
</section ><!-- /Security::Non-secure contexts remain non-secure -->
699
699
0 commit comments