Seems like we've got a positive signal from Mozilla, along with a spec bug <https://github.com/whatwg/url/issues/632>.
LGTM1 to remove, while fixing that issue in spec (and potentially in implementation) On Sun, Aug 22, 2021 at 10:52 PM Matt Menke <mme...@google.com> wrote: > Sorry, that should be "before instantiating content" (Or "before calling > ContentMain") > > On Sun, Aug 22, 2021 at 4:51 PM Matt Menke <mme...@google.com> wrote: > >> I've poked around here, and I'm not sure it's possible to wire this up to >> a base::Feature. Headless runs some code before instantiating context, >> including parsing a remote debugging IP address from the command line. >> This results in calling the IPv4 parser before content, and thus the global >> feature list, is loaded, which results in the feature code CHECKing. Even >> if we figured out a way to work around this, I'm concerned that other code >> not exercised by the trybots may be doing the same thing, which could >> result in a lot of unexpected surprises. >> >> I guess we could add a command line switch to bypass the check, though >> that's more difficult to use than a base::Feature, and can't be set >> server-side. Open to other ideas. >> >> On Fri, Aug 20, 2021 at 10:16 AM Matt Menke <mme...@google.com> wrote: >> >>> On second thought, doesn't seem to be any benefit to a partial rollout >>> on prerelease channels, so probably just land it with an enabled by default >>> base::Feature. >>> >>> On Fri, Aug 20, 2021 at 7:57 AM Matt Menke <mme...@google.com> wrote: >>> >>>> I'm planning to ship it behind a feature (enabled by default, after >>>> experimenting on pre-release channels) to allow emergency disabling. >>>> >>>> On Fri, Aug 20, 2021 at 12:53 AM Yoav Weiss <yoavwe...@chromium.org> >>>> wrote: >>>> >>>>> OK, I'm convinced that these are not "real" hosts, and that breaking >>>>> them will not result in actual user-visible breakage. Would it be possible >>>>> to ship this with a server-side flag that'd enable us to quickly revert in >>>>> case we're wrong? >>>>> >>>>> On Thu, Aug 19, 2021 at 6:09 PM Matt Menke <mme...@google.com> wrote: >>>>> >>>>>> So given information on this thread, I think the ways these can >>>>>> succeed are possibly: >>>>>> 1) Entries in the HOSTS file. >>>>>> 2) Intermediary DNS servers or MitMs typo squatting, or actively >>>>>> attacking the user. >>>>>> 3) Local DNS servers providing additional DNS results. >>>>>> 4) Suffix search (which would trigger on, e.g., "1533.67.89" but not >>>>>> "67.89.1533") >>>>>> 5) mDNS >>>>>> 6) Local tools injecting DNS lookup results. >>>>>> >>>>>> Unfortunately, we don't have a good way to gather hard data on which >>>>>> are more common. Given that there are potential security implications >>>>>> here, I'm reluctant to wait for another round of data gathering, though >>>>>> we >>>>>> could probably distinguish cases 4) and 5) from the others, and 1) as >>>>>> well, >>>>>> at least on some platforms. Also not sure how useful just knowing about >>>>>> those cases would be. >>>>>> On Thursday, August 19, 2021 at 11:54:29 AM UTC-4 Harald Alvestrand >>>>>> wrote: >>>>>> >>>>>>> Thanks - I misremembered which end of the class B network got jammed >>>>>>> together. 67.89.31533 is indeed the one that is "legal" syntax, and so >>>>>>> of >>>>>>> course 67.89.1 is too. >>>>>>> >>>>>>> >>>>>>> On Thu, Aug 19, 2021 at 3:20 PM Matt Menke <mme...@google.com> >>>>>>> wrote: >>>>>>> >>>>>>>> Note that 127.0.1 is mapped to 127.0.0.1 by GURL, following the URL >>>>>>>> spec, so that would generally not make it to the DNS resolver (unless >>>>>>>> something tried to resolve it directly). Per the URL spec, >>>>>>>> "31533.67.89" >>>>>>>> would not be normalized by GURL, but "67.89.31533" would be converted >>>>>>>> to >>>>>>>> 67.89.123.45. My instrumentation was at the DNS layer, so "127.0.1" >>>>>>>> and >>>>>>>> "67.89.31533" would not show up as problematic hostnames in my metrics, >>>>>>>> though "31533.67.89" would. >>>>>>>> >>>>>>>> On Thu, Aug 19, 2021 at 9:10 AM Harald Alvestrand <h...@google.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> An interesting property of all-numeric hostnames is that they >>>>>>>>> *may* be legitimate IPv4 addresses using highly archaic IP address >>>>>>>>> formats >>>>>>>>> - we're so used to the 123.45.67.89 syntax that we forget that >>>>>>>>> 31533.67.89 >>>>>>>>> once was regarded as a legitimate way to encode the same address >>>>>>>>> (class B >>>>>>>>> notation). >>>>>>>>> >>>>>>>>> There are also certain resolvers that will "helpfully" map an >>>>>>>>> all-numeric hostname presented in DNS to an IP address without asking >>>>>>>>> anyone. >>>>>>>>> So if those two bugs (or "archaic features") occur together, the >>>>>>>>> result may be a successful resolution. >>>>>>>>> >>>>>>>>> No idea why it would occur more often on Android than on Windows, >>>>>>>>> though. And my Linux boxes don't resolve 127.0.1 to anything. >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> On Thu, Aug 19, 2021 at 2:42 PM Yoav Weiss <yoav...@chromium.org> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> Interesting! What happens then in the "successful resolution" >>>>>>>>>> case Matt mentioned? >>>>>>>>>> >>>>>>>>>> On Thu, Aug 19, 2021 at 2:39 PM Harald Alvestrand < >>>>>>>>>> h...@google.com> wrote: >>>>>>>>>> >>>>>>>>>>> Department of odd facts: >>>>>>>>>>> >>>>>>>>>>> - The ICANN rules for new TLDs forbid all top level domain names >>>>>>>>>>> that start with a digit >>>>>>>>>>> - The IDNA rules for bidirectional scripts forbid domain names >>>>>>>>>>> that start with a digit (Unicode bidi afficandoes will know why) >>>>>>>>>>> - The only real reason why leading digits aren't outlawed in >>>>>>>>>>> domain names at the second level is 3com. >>>>>>>>>>> >>>>>>>>>>> It seems safe to say that no legitimate fully qualified hostname >>>>>>>>>>> will ever have a last component consisting only of digits. >>>>>>>>>>> That means the only time we could get a legitimate hostname is >>>>>>>>>>> for something that has to be resolved via a search path. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> On Thu, Aug 19, 2021 at 2:33 PM Yoav Weiss <yoav...@chromium.org> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:28 PM Matt Menke <mme...@google.com> >>>>>>>>>>>> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> I created the title using Chrome Status's deprecation >>>>>>>>>>>>> template, so any confusion should be blamed on that. >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> +Jason Robbins - on the title issues. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> I used the "Draft Intent to Deprecate and Remove email" >>>>>>>>>>>>> button, and assume I'd need to do a "Draft Intent to Ship email" >>>>>>>>>>>>> before >>>>>>>>>>>>> shipping to stable, after a 50% trial on prerelease channels. >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> There's no need for 2 emails for removals. We can discuss the >>>>>>>>>>>> full deprecation, experimentation/trials and removal on stable >>>>>>>>>>>> here. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:15 AM Yoav Weiss < >>>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:36 PM Matt Menke < >>>>>>>>>>>>>> mme...@google.com> wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 5:23 PM Yoav Weiss < >>>>>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:18 PM Matt Menke < >>>>>>>>>>>>>>>> mme...@google.com> wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 4:53 PM Yoav Weiss < >>>>>>>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 8:47 PM 'Matt Menke' via >>>>>>>>>>>>>>>>>> blink-dev <blin...@chromium.org> wrote: >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Contact emailsmme...@google.com >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> ExplainerNone >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Specificationhttps://url.spec.whatwg.org/ >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Summary >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but end >>>>>>>>>>>>>>>>>>> in numbers are treated as valid, and looked up via DNS >>>>>>>>>>>>>>>>>>> (e.g., >>>>>>>>>>>>>>>>>>> http://foo.127.1/). Per the Public Suffix List spec, >>>>>>>>>>>>>>>>>>> the eTLD+1 of the hostname in that URL should be "127.1". >>>>>>>>>>>>>>>>>>> If that is ever >>>>>>>>>>>>>>>>>>> fed back into a URLs, "http://127.1/ <http://127.0.0.1/>" >>>>>>>>>>>>>>>>>>> is mapped to "http://127.0.0.1/" by the URL spec, which >>>>>>>>>>>>>>>>>>> seems potentially dangerous. "127.0.0.0.1" could also >>>>>>>>>>>>>>>>>>> potentially be used >>>>>>>>>>>>>>>>>>> to confuse users. We want to reject URLs with these >>>>>>>>>>>>>>>>>>> hostnames. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Blink componentInternals>Network>DNS >>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3EDNS> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Motivation >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but end >>>>>>>>>>>>>>>>>>> in numbers are treated as valid hostnames, and looked up >>>>>>>>>>>>>>>>>>> via DNS. Example >>>>>>>>>>>>>>>>>>> hostnames: 127.0.0.0.1, foo.0.1, 10.0.0.09, 08.1.2.3. These >>>>>>>>>>>>>>>>>>> can be >>>>>>>>>>>>>>>>>>> problematic for the following reason: * " >>>>>>>>>>>>>>>>>>> http://foo.127.1/" has an eTLD+1 of "127.1", per the >>>>>>>>>>>>>>>>>>> public suffix list spec. If that's ever used as the >>>>>>>>>>>>>>>>>>> hostname in a new URL, >>>>>>>>>>>>>>>>>>> however, as in "http://127.1 <http://127.0.0.1/>", it >>>>>>>>>>>>>>>>>>> will then get mapped to "http://127.0.0.1/", per the >>>>>>>>>>>>>>>>>>> URL spec, which is a different host, which is not safe. * " >>>>>>>>>>>>>>>>>>> http://127.0.0.0.1" and "http://1.2.3.09", both of >>>>>>>>>>>>>>>>>>> which are looked up via DNS rather than failing or being >>>>>>>>>>>>>>>>>>> treated as IPv4 >>>>>>>>>>>>>>>>>>> hostnames, also seem potentially confusing. While no >>>>>>>>>>>>>>>>>>> exploit is currently >>>>>>>>>>>>>>>>>>> known here, we want to remove support for these as a >>>>>>>>>>>>>>>>>>> preventative security >>>>>>>>>>>>>>>>>>> measure. The URL spec has been updated so that any URL with >>>>>>>>>>>>>>>>>>> a hostname >>>>>>>>>>>>>>>>>>> ending in a number that's not an IPv4 address (including, >>>>>>>>>>>>>>>>>>> e.g., >>>>>>>>>>>>>>>>>>> http://foo.1./, but not http://foo.1../) is considered >>>>>>>>>>>>>>>>>>> invalid. Since this is part of the URL spec, not the DNS >>>>>>>>>>>>>>>>>>> spec, we want to >>>>>>>>>>>>>>>>>>> reject these URLs are the GURL layer, for URLs with >>>>>>>>>>>>>>>>>>> appropriate protocols >>>>>>>>>>>>>>>>>>> (http, https, ws, wss, file). For consistency, we should >>>>>>>>>>>>>>>>>>> also fail DNS >>>>>>>>>>>>>>>>>>> lookup attempts of these sorts of hostnames. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Initial public proposal >>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619 >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> TAG reviewNot required for an Intent to Deprecate, I >>>>>>>>>>>>>>>>>>> believe. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> TAG review statusNot applicable >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Risks >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Any URL with an affected hostname will fail to load, and >>>>>>>>>>>>>>>>>>> will need to be migrated to another hostname. URLs of this >>>>>>>>>>>>>>>>>>> form do appear >>>>>>>>>>>>>>>>>>> to be in use, though it's not clear under what >>>>>>>>>>>>>>>>>>> circumstances. No entry in >>>>>>>>>>>>>>>>>>> the public suffix list is affected. Affected URLs make up >>>>>>>>>>>>>>>>>>> no more than >>>>>>>>>>>>>>>>>>> 0.0003% of hostnames looked up via the host resolver on any >>>>>>>>>>>>>>>>>>> platform, and >>>>>>>>>>>>>>>>>>> are basically not used in any file URLs, according to our >>>>>>>>>>>>>>>>>>> metrics. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Do we have reason to believe these hostnames are not >>>>>>>>>>>>>>>>>> legitimate ones? >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Unfortunately, we have no insight into them - they could >>>>>>>>>>>>>>>>> be mistyped URLs sent to typo squatting ISPs that OSX lets >>>>>>>>>>>>>>>>> through but the >>>>>>>>>>>>>>>>> Windows host resolver blocks, and various flavors of Linux >>>>>>>>>>>>>>>>> treat >>>>>>>>>>>>>>>>> differently. Or they could be mapped via a hosts file, or >>>>>>>>>>>>>>>>> they could be >>>>>>>>>>>>>>>>> hostnames that only resolve on public networks. Could be >>>>>>>>>>>>>>>>> some network tool >>>>>>>>>>>>>>>>> that uses them when installed locally, but is only available >>>>>>>>>>>>>>>>> on certain >>>>>>>>>>>>>>>>> platforms. No reason to think one possibility is more likely >>>>>>>>>>>>>>>>> than the >>>>>>>>>>>>>>>>> others. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Do we have UKM for them that would enable us to test a >>>>>>>>>>>>>>>> random sample? >>>>>>>>>>>>>>>> I'm concerned about blocking those hostnames if they are >>>>>>>>>>>>>>>> legitimate, as that's something that a web developer can't do >>>>>>>>>>>>>>>> anything >>>>>>>>>>>>>>>> about. >>>>>>>>>>>>>>>> So even if the number of hosts is small, I'd like to get >>>>>>>>>>>>>>>> more certainty that they are *not* legitimate hosts before >>>>>>>>>>>>>>>> blocking them. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> We have UKM on their number (0.0003% of DNS lookups on OSX, >>>>>>>>>>>>>>> less elsewhere - we can't meaningfully instrument percent of >>>>>>>>>>>>>>> created GURLs), but we don't have their hostnames, what they >>>>>>>>>>>>>>> resolve to, or >>>>>>>>>>>>>>> know anything else about them, unfortunately. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Navigation to a subset of these as frame URLs were broken at >>>>>>>>>>>>>>> one point - I'm pretty sure the breakage even made it to stable: >>>>>>>>>>>>>>> https://crbug.com/1173238. There were no reports of >>>>>>>>>>>>>>> problems. Only non-IPv4 URLs where the last two components >>>>>>>>>>>>>>> were broken, >>>>>>>>>>>>>>> though, and it didn't affect subresources. On OSX and Android, >>>>>>>>>>>>>>> over 99% of >>>>>>>>>>>>>>> successfully resolved problematic hostnames fit into that >>>>>>>>>>>>>>> bucket, though on >>>>>>>>>>>>>>> Linux, only about 2% do. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> That doesn't give us any hard conclusions, except they're >>>>>>>>>>>>>>> either not deliberate navigations on OSX/Android, or they're not >>>>>>>>>>>>>>> navigations. >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> :| >>>>>>>>>>>>>> >>>>>>>>>>>>>> One more question: Is this an intent to Prototype or an >>>>>>>>>>>>>> intent to deprecate? The title is a bit unclear.. >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> On OSX and Android, about 90% of host resolver lookups >>>>>>>>>>>>>>>>>>> for these hostnames succeed, 60% do on Linux, and 2% on >>>>>>>>>>>>>>>>>>> Windows and >>>>>>>>>>>>>>>>>>> ChromeOS. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Do you know where those failures are coming from? >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Could be typos, could be the Windows and ChromeOS host >>>>>>>>>>>>>>>>> resolvers don't let them through. Since we've had no filed >>>>>>>>>>>>>>>>> bugs about >>>>>>>>>>>>>>>>> them, I suspect the failures are not deliberate navigations >>>>>>>>>>>>>>>>> or intended >>>>>>>>>>>>>>>>> network requests. I'm much more interested in where the >>>>>>>>>>>>>>>>> successes are >>>>>>>>>>>>>>>>> coming from, myself. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> To allow for emergency disabling in case of wider than >>>>>>>>>>>>>>>>>>> expected breakage, I intend to add a feature for it, and do >>>>>>>>>>>>>>>>>>> a 50% field >>>>>>>>>>>>>>>>>>> trial on pre-release channels, though plan to just enable >>>>>>>>>>>>>>>>>>> the feature, >>>>>>>>>>>>>>>>>>> rather than do a gradual rollout to stable, given the low >>>>>>>>>>>>>>>>>>> usage. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Gecko: Positive ( >>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619#issuecomment-890826499 >>>>>>>>>>>>>>>>>>> <https://www.chromestatus.com/admin/features/launch/5679790780579840/1?intent=1> >>>>>>>>>>>>>>>>>>> ) >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Can you file an official position request? >>>>>>>>>>>>>>>>>> https://bit.ly/blink-signals >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Done for Mozilla: >>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/568 >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Should I also do this for WebKit as well? They have in >>>>>>>>>>>>>>>>> process CLs, so not sure if it's still needed. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Agree that in-flight patches for WebKit are a sufficient >>>>>>>>>>>>>>>> positive signal. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> WebKit: In development ( >>>>>>>>>>>>>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=228826) >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Web developers: No signals >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Activation >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> This breaks anything using one of these domains, and >>>>>>>>>>>>>>>>>>> requires migrating to other hostnames. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Security >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> None >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Debuggability >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> These will act like any other invalid URL. Behavior is >>>>>>>>>>>>>>>>>>> context dependent. Since this is logic deep within GURL, >>>>>>>>>>>>>>>>>>> and GURLs are >>>>>>>>>>>>>>>>>>> created in a great many places, console warnings >>>>>>>>>>>>>>>>>>> specifically for this seem >>>>>>>>>>>>>>>>>>> not practical. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md> >>>>>>>>>>>>>>>>>>> ?No. Javascript URL construction is tested, but URLs >>>>>>>>>>>>>>>>>>> are used in a great many other places, which don't have test >>>>>>>>>>>>>>>>>>> coverage, since DNS lookups for these domains must succeed >>>>>>>>>>>>>>>>>>> in the first >>>>>>>>>>>>>>>>>>> place for the tests to be meaningful. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Flag name >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Requires code in //chrome?False >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Tracking bughttps://crbug.com/1237032 >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Estimated milestones >>>>>>>>>>>>>>>>>>> DevTrial on desktop 95 >>>>>>>>>>>>>>>>>>> DevTrial on Webview 95 >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5679790780579840 >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome Platform >>>>>>>>>>>>>>>>>>> Status <https://www.chromestatus.com/>. >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>>> You received this message because you are subscribed to >>>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group. >>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails >>>>>>>>>>>>>>>>>>> from it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com >>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>> it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com >>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>> . >>>>>>>>>>>> >>>>>>>>>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVzJT_Oy9G%2BuXdbxkUoS6qkLqM66b-rUg9NPq-CC0JPyg%40mail.gmail.com.