Apologies for the delay..

LGTM to run the deprecation trial M94-M101

On Wed, Aug 25, 2021 at 10:09 AM Titouan Rigoudy <tito...@google.com> wrote:

> Hi there,
>
> Any thoughts? We'd like to announce this trial in a blog post prior to
> beta promotion tomorrow.
>
> Cheers,
> Titouan
>
> On Fri, Aug 13, 2021 at 12:06 PM Titouan Rigoudy <tito...@google.com>
> wrote:
>
>> Hi API owners,
>>
>> We hit a snag trying to roll ship this trial in M93, and delayed to M94.
>> Details at the end for those interested.
>>
>> Separately, given the switch from a 6-week to a 4-week release cadence, I
>> believe the maximum trial length in milestones should be extended to keep a
>> similar length in calendar days. Instead of 5 milestones, it seems logical
>> to allow for 7 milestones instead.
>>
>> In addition, WebTransport implementers tell me that the server-side
>> situation is not yet sorted out. There is no easy off-the-shelf
>> WebTransport server for developers to use just yet. It will take some time
>> for the ecosystem to converge on a standard solution or two.
>>
>> Overall, *I would like to request approval to run this deprecation trial
>> from 94 to 101 (inclusive).* This would give developers until the end of
>> March 2022 to migrate.
>>
>> Details about the delay follow:
>>
>> The reason is that some developers run web apps inside intranets that
>> clients access through literal IP addresses (e.g. http://192.168.1.42).
>> A Deprecation Trial would require them to register tokens for each and
>> every deployment with a distinct IP address, then update the servers to
>> serve those tokens. This being in healthcare, updating servers is hard and
>> comes with a lot of red tape. In effect, it was practically impossible for
>> them to integrate with the trial framework in time.
>>
>> This deprecation has thus been down-scoped to cover only private network
>> requests made from *public* websites. Requests made from *private*
>> websites, such as the ones described above, can be tackled later.
>>
>> Cheers,
>> Titouan
>>
>> On Tue, Jun 29, 2021 at 11:09 AM Titouan Rigoudy <tito...@google.com>
>> wrote:
>>
>>> On Mon, Jun 28, 2021 at 4:18 PM Yoav Weiss <yoavwe...@chromium.org>
>>> wrote:
>>>
>>>> LGTM to run a deprecation trial M93-M98 (inclusive).
>>>>
>>>
>>> Thanks!
>>>
>>> On Mon, Jun 28, 2021 at 4:13 PM Titouan Rigoudy <tito...@google.com>
>>>> wrote:
>>>>
>>>>> On Mon, Jun 28, 2021 at 3:27 PM Yoav Weiss <yoavwe...@chromium.org>
>>>>> wrote:
>>>>>
>>>>>> Do I understand correctly that in parallel to this deprecation trial,
>>>>>> you'd also remove the private network access to non-secure contexts from
>>>>>> origins that aren't part of the trial? (per the I2S)
>>>>>>
>>>>>
>>>>> Exactly. This trial would preserve the ability for certain signed-up
>>>>> websites to delay the deprecation for a few milestones.
>>>>>
>>>>>
>>>>>> Also, what are the experimentation timelines?
>>>>>>
>>>>>
>>>>> +Yutaka Hirano <yhir...@google.com> from WebTransport tells me they
>>>>> are aiming to ship in M96. I think it would be reasonable to run the trial
>>>>> for 2 more milestones after that. So, we would run this trial until M99
>>>>> (exclusive).
>>>>>
>>>>
>>>> IIRC, WebTransport would provide the alternative implementation. Is
>>>> that correct?
>>>>
>>>
>>> Exactly.
>>>
>>> Cheers,
>>> Titouan
>>>
>>>
>>>>
>>>>>
>>>>>> On Mon, Jun 28, 2021 at 12:48 PM 'Titouan Rigoudy' via blink-dev <
>>>>>> blink-dev@chromium.org> wrote:
>>>>>>
>>>>>>> Contact emailstito...@chromium.org, cl...@chromium.org,
>>>>>>> mk...@chromium.org, v...@chromium.org
>>>>>>>
>>>>>>> Explainer
>>>>>>> https://github.com/WICG/private-network-access/blob/master/explainer.md
>>>>>>>
>>>>>>> Specificationhttps://wicg.github.io/private-network-access/
>>>>>>>
>>>>>>> API specYes
>>>>>>>
>>>>>>> Design docs
>>>>>>>
>>>>>>> https://docs.google.com/document/d/1x1a1fQLOrcWogK3tpFBgQZQ5ZjcONTvD0IqqXkgrg5I/edit#heading=h.7nki9mck5t64
>>>>>>>
>>>>>>> Summary
>>>>>>>
>>>>>>> Requires that private network requests for subresources may only be
>>>>>>> initiated from a secure context. "Private network requests" are those
>>>>>>> initiated from a public network, targeting a private network. Examples
>>>>>>> include internet to intranet requests and intranet loopbacks. This is a
>>>>>>> first step towards fully implementing Private Network Access:
>>>>>>> https://wicg.github.io/private-network-access/
>>>>>>>
>>>>>>>
>>>>>>> Blink componentBlink>SecurityFeature>CORS
>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS>
>>>>>>>
>>>>>>> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/572
>>>>>>>
>>>>>>> TAG review statusUnder way
>>>>>>>
>>>>>>
>>>>>> Seems like it's resolved :)
>>>>>>
>>>>>
>>>>> Mostly, indeed. It reminds me that I should poke them now that the
>>>>> IETF and Martin Thomson's concerns are resolved.
>>>>>
>>>>>
>>>>>>
>>>>>>>
>>>>>>> Risks
>>>>>>>
>>>>>>>
>>>>>>> Interoperability and Compatibility
>>>>>>>
>>>>>>> No interoperability risks. Compatibility risk is small but
>>>>>>> non-negligible. UseCounters show ~0.1% of page visits making use of this
>>>>>>> feature. Direct outreach to the largest users per UKM data revealed no
>>>>>>> objections to this launch. Rolling this deprecation out to beta per the
>>>>>>> previous I2S resulted in more feedback about the compatibility risk and 
>>>>>>> the
>>>>>>> need for a time extension. See the following doc for an extensive
>>>>>>> discussion:
>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit
>>>>>>>
>>>>>>>
>>>>>>> Gecko: Under consideration (
>>>>>>> https://github.com/mozilla/standards-positions/issues/143)
>>>>>>> Tentatively positive, but no formal position yet.
>>>>>>>
>>>>>>> WebKit: Positive (
>>>>>>> https://lists.webkit.org/pipermail/webkit-dev/2021-May/031837.html)
>>>>>>>
>>>>>>> Web developers: Negative (
>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit)
>>>>>>> Some websites, broadly falling in the category of controller webapps for
>>>>>>> IoT devices, find this change incompatible with their use cases. While 
>>>>>>> most
>>>>>>> use cases can be solved with tailored workarounds, some may still 
>>>>>>> require
>>>>>>> further engagement.
>>>>>>>
>>>>>>> Activation
>>>>>>>
>>>>>>> Developers of non-secure sites that rely upon local servers will
>>>>>>> need to upgrade to HTTPS. This might cause some complications, as
>>>>>>> mixed-content checks will begin to apply. Chrome carves out HTTP access 
>>>>>>> to
>>>>>>> loopback (as perhttps://
>>>>>>> w3c.github.io/webappsec-secure-contexts/#localhost), which is a
>>>>>>> release valve for folks who don't want to go through the effort of
>>>>>>> securely-distributing certs for local servers. The initial launch in M92
>>>>>>> was delayed due to compatibility risks surfaced during the rollout to 
>>>>>>> beta.
>>>>>>> See this doc for a lot more details:
>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit
>>>>>>>
>>>>>>>
>>>>>>> Security
>>>>>>>
>>>>>>> This change should be security-positive.
>>>>>>>
>>>>>>>
>>>>>>> Since this deprecation only affects non-secure contexts, however,
>>>>>>> this Deprecation Trial would need to allow non-secure/HTTP origins to 
>>>>>>> sign
>>>>>>> up. This is a departure from established practice where Origin Trials 
>>>>>>> are
>>>>>>> scoped to secure/HTTPS origins only. While this may open the door to
>>>>>>> silliness due to the lack of authentication, it seems inevitable that
>>>>>>> Deprecation Trials allow HTTP origins to sign up. Indeed more and more
>>>>>>> features of the Web Platform will be deprecated over time as their 
>>>>>>> access
>>>>>>> is restricted to secure contexts. Each of those deprecations will 
>>>>>>> require a
>>>>>>> similar setup. Note that there is no technical obstacle to this, see the
>>>>>>> discussion here
>>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv>
>>>>>>> .
>>>>>>>
>>>>>>>
>>>>>>> Goals for experimentation
>>>>>>>
>>>>>>> It seems that many developers have not noticed the upcoming launch
>>>>>>> despite outreach efforts, and will likely only notice once Chrome ships 
>>>>>>> the
>>>>>>> secure context restriction. Thus delaying the launch by a few 
>>>>>>> milestones to
>>>>>>> offer more breathing room to the currently-aware developers would not
>>>>>>> mitigate the risk when we ship the next time. A Deprecation Trial seems
>>>>>>> like the logical next step. This would allow us to protect the vast
>>>>>>> majority of users of the web by at least requiring attackers to sign up 
>>>>>>> for
>>>>>>> the trial, itself a deterrent. Simultaneously, it would give enough 
>>>>>>> time to
>>>>>>> legitimate websites to work around the new restriction. Finally, it 
>>>>>>> would
>>>>>>> allow more time for discussions should our planned solutions fail to
>>>>>>> adequately address developers’ concerns.
>>>>>>>
>>>>>>>
>>>>>>> Ongoing technical constraints
>>>>>>>
>>>>>>> The Origin Trial will only support setting tokens via headers, and
>>>>>>> not via a <meta> tag. This is because the opt-in status of a given 
>>>>>>> document
>>>>>>> must be known at commit time, before the document has started being 
>>>>>>> parsed.
>>>>>>> This is similar to the existing SharedArrayBuffer deprecation trial
>>>>>>> <https://developer.chrome.com/origintrials/#/view_trial/303992974847508481>.
>>>>>>> See also details here
>>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv>
>>>>>>> .
>>>>>>>
>>>>>>> Debuggability
>>>>>>>
>>>>>>> When a request is made that violates this restriction and the
>>>>>>> feature is not enabled, three things happen: 1. A warning message is 
>>>>>>> logged
>>>>>>> to the DevTools console. 2. A deprecation report is filed against the
>>>>>>> initiator website's Reporting API, if so configured. 3. An issue is
>>>>>>> surfaced in the DevTools Issues panel. Likewise, when the feature is
>>>>>>> enabled and a request is blocked, the same happens except that the 
>>>>>>> message
>>>>>>> logged to the DevTools console is an error and its text is slightly
>>>>>>> different. The devtools network panel shows information about the source
>>>>>>> and remote address spaces at play.
>>>>>>>
>>>>>>>
>>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?Yes
>>>>>>>
>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>> ?Not yet. Implementation is being finalized, now that WPT RFC 72
>>>>>>> <https://github.com/web-platform-tests/rfcs/blob/master/rfcs/address_space_overrides.md>
>>>>>>> has finally been implemented with WPT PR #28870
>>>>>>> <https://github.com/web-platform-tests/wpt/pull/28870>.
>>>>>>>
>>>>>>> Flag nameBlockInsecurePrivateNetworkRequests
>>>>>>>
>>>>>>> Tracking bughttps://crbug.com/986744
>>>>>>>
>>>>>>> Launch bughttps://crbug.com/1129801
>>>>>>>
>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>> https://chromestatus.com/feature/5436853517811712
>>>>>>>
>>>>>>> Links to previous Intent discussionsIntent to prototype:
>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ
>>>>>>> Ready for Trial:
>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ
>>>>>>> Intent to Ship:
>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/cPiRNjFoCag/m/DxEEN9-6BQAJ
>>>>>>>
>>>>>>>
>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>> <https://www.chromestatus.com/>.
>>>>>>>
>>>>>>> --
>>>>>>> You received this message because you are subscribed to the Google
>>>>>>> Groups "blink-dev" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>> To view this discussion on the web visit
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com
>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>> .
>>>>>>>
>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfW8Rbxrc9Q13TsB7UhO3hfseJjeTdTtaDB39QsmhfBT5A%40mail.gmail.com.

Reply via email to