Apologies for the delay.. LGTM to run the deprecation trial M94-M101
On Wed, Aug 25, 2021 at 10:09 AM Titouan Rigoudy <tito...@google.com> wrote: > Hi there, > > Any thoughts? We'd like to announce this trial in a blog post prior to > beta promotion tomorrow. > > Cheers, > Titouan > > On Fri, Aug 13, 2021 at 12:06 PM Titouan Rigoudy <tito...@google.com> > wrote: > >> Hi API owners, >> >> We hit a snag trying to roll ship this trial in M93, and delayed to M94. >> Details at the end for those interested. >> >> Separately, given the switch from a 6-week to a 4-week release cadence, I >> believe the maximum trial length in milestones should be extended to keep a >> similar length in calendar days. Instead of 5 milestones, it seems logical >> to allow for 7 milestones instead. >> >> In addition, WebTransport implementers tell me that the server-side >> situation is not yet sorted out. There is no easy off-the-shelf >> WebTransport server for developers to use just yet. It will take some time >> for the ecosystem to converge on a standard solution or two. >> >> Overall, *I would like to request approval to run this deprecation trial >> from 94 to 101 (inclusive).* This would give developers until the end of >> March 2022 to migrate. >> >> Details about the delay follow: >> >> The reason is that some developers run web apps inside intranets that >> clients access through literal IP addresses (e.g. http://192.168.1.42). >> A Deprecation Trial would require them to register tokens for each and >> every deployment with a distinct IP address, then update the servers to >> serve those tokens. This being in healthcare, updating servers is hard and >> comes with a lot of red tape. In effect, it was practically impossible for >> them to integrate with the trial framework in time. >> >> This deprecation has thus been down-scoped to cover only private network >> requests made from *public* websites. Requests made from *private* >> websites, such as the ones described above, can be tackled later. >> >> Cheers, >> Titouan >> >> On Tue, Jun 29, 2021 at 11:09 AM Titouan Rigoudy <tito...@google.com> >> wrote: >> >>> On Mon, Jun 28, 2021 at 4:18 PM Yoav Weiss <yoavwe...@chromium.org> >>> wrote: >>> >>>> LGTM to run a deprecation trial M93-M98 (inclusive). >>>> >>> >>> Thanks! >>> >>> On Mon, Jun 28, 2021 at 4:13 PM Titouan Rigoudy <tito...@google.com> >>>> wrote: >>>> >>>>> On Mon, Jun 28, 2021 at 3:27 PM Yoav Weiss <yoavwe...@chromium.org> >>>>> wrote: >>>>> >>>>>> Do I understand correctly that in parallel to this deprecation trial, >>>>>> you'd also remove the private network access to non-secure contexts from >>>>>> origins that aren't part of the trial? (per the I2S) >>>>>> >>>>> >>>>> Exactly. This trial would preserve the ability for certain signed-up >>>>> websites to delay the deprecation for a few milestones. >>>>> >>>>> >>>>>> Also, what are the experimentation timelines? >>>>>> >>>>> >>>>> +Yutaka Hirano <yhir...@google.com> from WebTransport tells me they >>>>> are aiming to ship in M96. I think it would be reasonable to run the trial >>>>> for 2 more milestones after that. So, we would run this trial until M99 >>>>> (exclusive). >>>>> >>>> >>>> IIRC, WebTransport would provide the alternative implementation. Is >>>> that correct? >>>> >>> >>> Exactly. >>> >>> Cheers, >>> Titouan >>> >>> >>>> >>>>> >>>>>> On Mon, Jun 28, 2021 at 12:48 PM 'Titouan Rigoudy' via blink-dev < >>>>>> blink-dev@chromium.org> wrote: >>>>>> >>>>>>> Contact emailstito...@chromium.org, cl...@chromium.org, >>>>>>> mk...@chromium.org, v...@chromium.org >>>>>>> >>>>>>> Explainer >>>>>>> https://github.com/WICG/private-network-access/blob/master/explainer.md >>>>>>> >>>>>>> Specificationhttps://wicg.github.io/private-network-access/ >>>>>>> >>>>>>> API specYes >>>>>>> >>>>>>> Design docs >>>>>>> >>>>>>> https://docs.google.com/document/d/1x1a1fQLOrcWogK3tpFBgQZQ5ZjcONTvD0IqqXkgrg5I/edit#heading=h.7nki9mck5t64 >>>>>>> >>>>>>> Summary >>>>>>> >>>>>>> Requires that private network requests for subresources may only be >>>>>>> initiated from a secure context. "Private network requests" are those >>>>>>> initiated from a public network, targeting a private network. Examples >>>>>>> include internet to intranet requests and intranet loopbacks. This is a >>>>>>> first step towards fully implementing Private Network Access: >>>>>>> https://wicg.github.io/private-network-access/ >>>>>>> >>>>>>> >>>>>>> Blink componentBlink>SecurityFeature>CORS >>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS> >>>>>>> >>>>>>> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/572 >>>>>>> >>>>>>> TAG review statusUnder way >>>>>>> >>>>>> >>>>>> Seems like it's resolved :) >>>>>> >>>>> >>>>> Mostly, indeed. It reminds me that I should poke them now that the >>>>> IETF and Martin Thomson's concerns are resolved. >>>>> >>>>> >>>>>> >>>>>>> >>>>>>> Risks >>>>>>> >>>>>>> >>>>>>> Interoperability and Compatibility >>>>>>> >>>>>>> No interoperability risks. Compatibility risk is small but >>>>>>> non-negligible. UseCounters show ~0.1% of page visits making use of this >>>>>>> feature. Direct outreach to the largest users per UKM data revealed no >>>>>>> objections to this launch. Rolling this deprecation out to beta per the >>>>>>> previous I2S resulted in more feedback about the compatibility risk and >>>>>>> the >>>>>>> need for a time extension. See the following doc for an extensive >>>>>>> discussion: >>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit >>>>>>> >>>>>>> >>>>>>> Gecko: Under consideration ( >>>>>>> https://github.com/mozilla/standards-positions/issues/143) >>>>>>> Tentatively positive, but no formal position yet. >>>>>>> >>>>>>> WebKit: Positive ( >>>>>>> https://lists.webkit.org/pipermail/webkit-dev/2021-May/031837.html) >>>>>>> >>>>>>> Web developers: Negative ( >>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit) >>>>>>> Some websites, broadly falling in the category of controller webapps for >>>>>>> IoT devices, find this change incompatible with their use cases. While >>>>>>> most >>>>>>> use cases can be solved with tailored workarounds, some may still >>>>>>> require >>>>>>> further engagement. >>>>>>> >>>>>>> Activation >>>>>>> >>>>>>> Developers of non-secure sites that rely upon local servers will >>>>>>> need to upgrade to HTTPS. This might cause some complications, as >>>>>>> mixed-content checks will begin to apply. Chrome carves out HTTP access >>>>>>> to >>>>>>> loopback (as perhttps:// >>>>>>> w3c.github.io/webappsec-secure-contexts/#localhost), which is a >>>>>>> release valve for folks who don't want to go through the effort of >>>>>>> securely-distributing certs for local servers. The initial launch in M92 >>>>>>> was delayed due to compatibility risks surfaced during the rollout to >>>>>>> beta. >>>>>>> See this doc for a lot more details: >>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit >>>>>>> >>>>>>> >>>>>>> Security >>>>>>> >>>>>>> This change should be security-positive. >>>>>>> >>>>>>> >>>>>>> Since this deprecation only affects non-secure contexts, however, >>>>>>> this Deprecation Trial would need to allow non-secure/HTTP origins to >>>>>>> sign >>>>>>> up. This is a departure from established practice where Origin Trials >>>>>>> are >>>>>>> scoped to secure/HTTPS origins only. While this may open the door to >>>>>>> silliness due to the lack of authentication, it seems inevitable that >>>>>>> Deprecation Trials allow HTTP origins to sign up. Indeed more and more >>>>>>> features of the Web Platform will be deprecated over time as their >>>>>>> access >>>>>>> is restricted to secure contexts. Each of those deprecations will >>>>>>> require a >>>>>>> similar setup. Note that there is no technical obstacle to this, see the >>>>>>> discussion here >>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv> >>>>>>> . >>>>>>> >>>>>>> >>>>>>> Goals for experimentation >>>>>>> >>>>>>> It seems that many developers have not noticed the upcoming launch >>>>>>> despite outreach efforts, and will likely only notice once Chrome ships >>>>>>> the >>>>>>> secure context restriction. Thus delaying the launch by a few >>>>>>> milestones to >>>>>>> offer more breathing room to the currently-aware developers would not >>>>>>> mitigate the risk when we ship the next time. A Deprecation Trial seems >>>>>>> like the logical next step. This would allow us to protect the vast >>>>>>> majority of users of the web by at least requiring attackers to sign up >>>>>>> for >>>>>>> the trial, itself a deterrent. Simultaneously, it would give enough >>>>>>> time to >>>>>>> legitimate websites to work around the new restriction. Finally, it >>>>>>> would >>>>>>> allow more time for discussions should our planned solutions fail to >>>>>>> adequately address developers’ concerns. >>>>>>> >>>>>>> >>>>>>> Ongoing technical constraints >>>>>>> >>>>>>> The Origin Trial will only support setting tokens via headers, and >>>>>>> not via a <meta> tag. This is because the opt-in status of a given >>>>>>> document >>>>>>> must be known at commit time, before the document has started being >>>>>>> parsed. >>>>>>> This is similar to the existing SharedArrayBuffer deprecation trial >>>>>>> <https://developer.chrome.com/origintrials/#/view_trial/303992974847508481>. >>>>>>> See also details here >>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv> >>>>>>> . >>>>>>> >>>>>>> Debuggability >>>>>>> >>>>>>> When a request is made that violates this restriction and the >>>>>>> feature is not enabled, three things happen: 1. A warning message is >>>>>>> logged >>>>>>> to the DevTools console. 2. A deprecation report is filed against the >>>>>>> initiator website's Reporting API, if so configured. 3. An issue is >>>>>>> surfaced in the DevTools Issues panel. Likewise, when the feature is >>>>>>> enabled and a request is blocked, the same happens except that the >>>>>>> message >>>>>>> logged to the DevTools console is an error and its text is slightly >>>>>>> different. The devtools network panel shows information about the source >>>>>>> and remote address spaces at play. >>>>>>> >>>>>>> >>>>>>> Will this feature be supported on all six Blink platforms (Windows, >>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?Yes >>>>>>> >>>>>>> Is this feature fully tested by web-platform-tests >>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md> >>>>>>> ?Not yet. Implementation is being finalized, now that WPT RFC 72 >>>>>>> <https://github.com/web-platform-tests/rfcs/blob/master/rfcs/address_space_overrides.md> >>>>>>> has finally been implemented with WPT PR #28870 >>>>>>> <https://github.com/web-platform-tests/wpt/pull/28870>. >>>>>>> >>>>>>> Flag nameBlockInsecurePrivateNetworkRequests >>>>>>> >>>>>>> Tracking bughttps://crbug.com/986744 >>>>>>> >>>>>>> Launch bughttps://crbug.com/1129801 >>>>>>> >>>>>>> Link to entry on the Chrome Platform Status >>>>>>> https://chromestatus.com/feature/5436853517811712 >>>>>>> >>>>>>> Links to previous Intent discussionsIntent to prototype: >>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ >>>>>>> Ready for Trial: >>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ >>>>>>> Intent to Ship: >>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/cPiRNjFoCag/m/DxEEN9-6BQAJ >>>>>>> >>>>>>> >>>>>>> This intent message was generated by Chrome Platform Status >>>>>>> <https://www.chromestatus.com/>. >>>>>>> >>>>>>> -- >>>>>>> You received this message because you are subscribed to the Google >>>>>>> Groups "blink-dev" group. >>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>> To view this discussion on the web visit >>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com >>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>> . >>>>>>> >>>>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfW8Rbxrc9Q13TsB7UhO3hfseJjeTdTtaDB39QsmhfBT5A%40mail.gmail.com.