No worries, thanks for the reply! We'll announce that then.

Cheers,
Titouan

On Wed, Aug 25, 2021 at 12:41 PM Yoav Weiss <yoavwe...@chromium.org> wrote:

> Apologies for the delay..
>
> LGTM to run the deprecation trial M94-M101
>
> On Wed, Aug 25, 2021 at 10:09 AM Titouan Rigoudy <tito...@google.com>
> wrote:
>
>> Hi there,
>>
>> Any thoughts? We'd like to announce this trial in a blog post prior to
>> beta promotion tomorrow.
>>
>> Cheers,
>> Titouan
>>
>> On Fri, Aug 13, 2021 at 12:06 PM Titouan Rigoudy <tito...@google.com>
>> wrote:
>>
>>> Hi API owners,
>>>
>>> We hit a snag trying to roll ship this trial in M93, and delayed to M94.
>>> Details at the end for those interested.
>>>
>>> Separately, given the switch from a 6-week to a 4-week release cadence,
>>> I believe the maximum trial length in milestones should be extended to keep
>>> a similar length in calendar days. Instead of 5 milestones, it seems
>>> logical to allow for 7 milestones instead.
>>>
>>> In addition, WebTransport implementers tell me that the server-side
>>> situation is not yet sorted out. There is no easy off-the-shelf
>>> WebTransport server for developers to use just yet. It will take some time
>>> for the ecosystem to converge on a standard solution or two.
>>>
>>> Overall, *I would like to request approval to run this deprecation
>>> trial from 94 to 101 (inclusive).* This would give developers until the
>>> end of March 2022 to migrate.
>>>
>>> Details about the delay follow:
>>>
>>> The reason is that some developers run web apps inside intranets that
>>> clients access through literal IP addresses (e.g. http://192.168.1.42).
>>> A Deprecation Trial would require them to register tokens for each and
>>> every deployment with a distinct IP address, then update the servers to
>>> serve those tokens. This being in healthcare, updating servers is hard and
>>> comes with a lot of red tape. In effect, it was practically impossible for
>>> them to integrate with the trial framework in time.
>>>
>>> This deprecation has thus been down-scoped to cover only private network
>>> requests made from *public* websites. Requests made from *private*
>>> websites, such as the ones described above, can be tackled later.
>>>
>>> Cheers,
>>> Titouan
>>>
>>> On Tue, Jun 29, 2021 at 11:09 AM Titouan Rigoudy <tito...@google.com>
>>> wrote:
>>>
>>>> On Mon, Jun 28, 2021 at 4:18 PM Yoav Weiss <yoavwe...@chromium.org>
>>>> wrote:
>>>>
>>>>> LGTM to run a deprecation trial M93-M98 (inclusive).
>>>>>
>>>>
>>>> Thanks!
>>>>
>>>> On Mon, Jun 28, 2021 at 4:13 PM Titouan Rigoudy <tito...@google.com>
>>>>> wrote:
>>>>>
>>>>>> On Mon, Jun 28, 2021 at 3:27 PM Yoav Weiss <yoavwe...@chromium.org>
>>>>>> wrote:
>>>>>>
>>>>>>> Do I understand correctly that in parallel to this deprecation
>>>>>>> trial, you'd also remove the private network access to non-secure 
>>>>>>> contexts
>>>>>>> from origins that aren't part of the trial? (per the I2S)
>>>>>>>
>>>>>>
>>>>>> Exactly. This trial would preserve the ability for certain signed-up
>>>>>> websites to delay the deprecation for a few milestones.
>>>>>>
>>>>>>
>>>>>>> Also, what are the experimentation timelines?
>>>>>>>
>>>>>>
>>>>>> +Yutaka Hirano <yhir...@google.com> from WebTransport tells me they
>>>>>> are aiming to ship in M96. I think it would be reasonable to run the 
>>>>>> trial
>>>>>> for 2 more milestones after that. So, we would run this trial until M99
>>>>>> (exclusive).
>>>>>>
>>>>>
>>>>> IIRC, WebTransport would provide the alternative implementation. Is
>>>>> that correct?
>>>>>
>>>>
>>>> Exactly.
>>>>
>>>> Cheers,
>>>> Titouan
>>>>
>>>>
>>>>>
>>>>>>
>>>>>>> On Mon, Jun 28, 2021 at 12:48 PM 'Titouan Rigoudy' via blink-dev <
>>>>>>> blink-dev@chromium.org> wrote:
>>>>>>>
>>>>>>>> Contact emailstito...@chromium.org, cl...@chromium.org,
>>>>>>>> mk...@chromium.org, v...@chromium.org
>>>>>>>>
>>>>>>>> Explainer
>>>>>>>> https://github.com/WICG/private-network-access/blob/master/explainer.md
>>>>>>>>
>>>>>>>> Specificationhttps://wicg.github.io/private-network-access/
>>>>>>>>
>>>>>>>> API specYes
>>>>>>>>
>>>>>>>> Design docs
>>>>>>>>
>>>>>>>> https://docs.google.com/document/d/1x1a1fQLOrcWogK3tpFBgQZQ5ZjcONTvD0IqqXkgrg5I/edit#heading=h.7nki9mck5t64
>>>>>>>>
>>>>>>>> Summary
>>>>>>>>
>>>>>>>> Requires that private network requests for subresources may only be
>>>>>>>> initiated from a secure context. "Private network requests" are those
>>>>>>>> initiated from a public network, targeting a private network. Examples
>>>>>>>> include internet to intranet requests and intranet loopbacks. This is a
>>>>>>>> first step towards fully implementing Private Network Access:
>>>>>>>> https://wicg.github.io/private-network-access/
>>>>>>>>
>>>>>>>>
>>>>>>>> Blink componentBlink>SecurityFeature>CORS
>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS>
>>>>>>>>
>>>>>>>> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/572
>>>>>>>>
>>>>>>>> TAG review statusUnder way
>>>>>>>>
>>>>>>>
>>>>>>> Seems like it's resolved :)
>>>>>>>
>>>>>>
>>>>>> Mostly, indeed. It reminds me that I should poke them now that the
>>>>>> IETF and Martin Thomson's concerns are resolved.
>>>>>>
>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>> Risks
>>>>>>>>
>>>>>>>>
>>>>>>>> Interoperability and Compatibility
>>>>>>>>
>>>>>>>> No interoperability risks. Compatibility risk is small but
>>>>>>>> non-negligible. UseCounters show ~0.1% of page visits making use of 
>>>>>>>> this
>>>>>>>> feature. Direct outreach to the largest users per UKM data revealed no
>>>>>>>> objections to this launch. Rolling this deprecation out to beta per the
>>>>>>>> previous I2S resulted in more feedback about the compatibility risk 
>>>>>>>> and the
>>>>>>>> need for a time extension. See the following doc for an extensive
>>>>>>>> discussion:
>>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit
>>>>>>>>
>>>>>>>>
>>>>>>>> Gecko: Under consideration (
>>>>>>>> https://github.com/mozilla/standards-positions/issues/143)
>>>>>>>> Tentatively positive, but no formal position yet.
>>>>>>>>
>>>>>>>> WebKit: Positive (
>>>>>>>> https://lists.webkit.org/pipermail/webkit-dev/2021-May/031837.html)
>>>>>>>>
>>>>>>>> Web developers: Negative (
>>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit)
>>>>>>>> Some websites, broadly falling in the category of controller webapps 
>>>>>>>> for
>>>>>>>> IoT devices, find this change incompatible with their use cases. While 
>>>>>>>> most
>>>>>>>> use cases can be solved with tailored workarounds, some may still 
>>>>>>>> require
>>>>>>>> further engagement.
>>>>>>>>
>>>>>>>> Activation
>>>>>>>>
>>>>>>>> Developers of non-secure sites that rely upon local servers will
>>>>>>>> need to upgrade to HTTPS. This might cause some complications, as
>>>>>>>> mixed-content checks will begin to apply. Chrome carves out HTTP 
>>>>>>>> access to
>>>>>>>> loopback (as perhttps://
>>>>>>>> w3c.github.io/webappsec-secure-contexts/#localhost), which is a
>>>>>>>> release valve for folks who don't want to go through the effort of
>>>>>>>> securely-distributing certs for local servers. The initial launch in 
>>>>>>>> M92
>>>>>>>> was delayed due to compatibility risks surfaced during the rollout to 
>>>>>>>> beta.
>>>>>>>> See this doc for a lot more details:
>>>>>>>> https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit
>>>>>>>>
>>>>>>>>
>>>>>>>> Security
>>>>>>>>
>>>>>>>> This change should be security-positive.
>>>>>>>>
>>>>>>>>
>>>>>>>> Since this deprecation only affects non-secure contexts, however,
>>>>>>>> this Deprecation Trial would need to allow non-secure/HTTP origins to 
>>>>>>>> sign
>>>>>>>> up. This is a departure from established practice where Origin Trials 
>>>>>>>> are
>>>>>>>> scoped to secure/HTTPS origins only. While this may open the door to
>>>>>>>> silliness due to the lack of authentication, it seems inevitable that
>>>>>>>> Deprecation Trials allow HTTP origins to sign up. Indeed more and more
>>>>>>>> features of the Web Platform will be deprecated over time as their 
>>>>>>>> access
>>>>>>>> is restricted to secure contexts. Each of those deprecations will 
>>>>>>>> require a
>>>>>>>> similar setup. Note that there is no technical obstacle to this, see 
>>>>>>>> the
>>>>>>>> discussion here
>>>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv>
>>>>>>>> .
>>>>>>>>
>>>>>>>>
>>>>>>>> Goals for experimentation
>>>>>>>>
>>>>>>>> It seems that many developers have not noticed the upcoming launch
>>>>>>>> despite outreach efforts, and will likely only notice once Chrome 
>>>>>>>> ships the
>>>>>>>> secure context restriction. Thus delaying the launch by a few 
>>>>>>>> milestones to
>>>>>>>> offer more breathing room to the currently-aware developers would not
>>>>>>>> mitigate the risk when we ship the next time. A Deprecation Trial seems
>>>>>>>> like the logical next step. This would allow us to protect the vast
>>>>>>>> majority of users of the web by at least requiring attackers to sign 
>>>>>>>> up for
>>>>>>>> the trial, itself a deterrent. Simultaneously, it would give enough 
>>>>>>>> time to
>>>>>>>> legitimate websites to work around the new restriction. Finally, it 
>>>>>>>> would
>>>>>>>> allow more time for discussions should our planned solutions fail to
>>>>>>>> adequately address developers’ concerns.
>>>>>>>>
>>>>>>>>
>>>>>>>> Ongoing technical constraints
>>>>>>>>
>>>>>>>> The Origin Trial will only support setting tokens via headers, and
>>>>>>>> not via a <meta> tag. This is because the opt-in status of a given 
>>>>>>>> document
>>>>>>>> must be known at commit time, before the document has started being 
>>>>>>>> parsed.
>>>>>>>> This is similar to the existing SharedArrayBuffer deprecation trial
>>>>>>>> <https://developer.chrome.com/origintrials/#/view_trial/303992974847508481>.
>>>>>>>> See also details here
>>>>>>>> <https://docs.google.com/document/d/1bpis0QwaA9ZrRFmpPW6LiaPmdwT0UhhUMNsEnU0zfLk/edit#heading=h.spjnqwrphxwv>
>>>>>>>> .
>>>>>>>>
>>>>>>>> Debuggability
>>>>>>>>
>>>>>>>> When a request is made that violates this restriction and the
>>>>>>>> feature is not enabled, three things happen: 1. A warning message is 
>>>>>>>> logged
>>>>>>>> to the DevTools console. 2. A deprecation report is filed against the
>>>>>>>> initiator website's Reporting API, if so configured. 3. An issue is
>>>>>>>> surfaced in the DevTools Issues panel. Likewise, when the feature is
>>>>>>>> enabled and a request is blocked, the same happens except that the 
>>>>>>>> message
>>>>>>>> logged to the DevTools console is an error and its text is slightly
>>>>>>>> different. The devtools network panel shows information about the 
>>>>>>>> source
>>>>>>>> and remote address spaces at play.
>>>>>>>>
>>>>>>>>
>>>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)?Yes
>>>>>>>>
>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>> ?Not yet. Implementation is being finalized, now that WPT RFC 72
>>>>>>>> <https://github.com/web-platform-tests/rfcs/blob/master/rfcs/address_space_overrides.md>
>>>>>>>> has finally been implemented with WPT PR #28870
>>>>>>>> <https://github.com/web-platform-tests/wpt/pull/28870>.
>>>>>>>>
>>>>>>>> Flag nameBlockInsecurePrivateNetworkRequests
>>>>>>>>
>>>>>>>> Tracking bughttps://crbug.com/986744
>>>>>>>>
>>>>>>>> Launch bughttps://crbug.com/1129801
>>>>>>>>
>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>> https://chromestatus.com/feature/5436853517811712
>>>>>>>>
>>>>>>>> Links to previous Intent discussionsIntent to prototype:
>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ
>>>>>>>> Ready for Trial:
>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/EeGg7TxW6U4/m/7ZvqAqHLAwAJ
>>>>>>>> Intent to Ship:
>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/cPiRNjFoCag/m/DxEEN9-6BQAJ
>>>>>>>>
>>>>>>>>
>>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>>> <https://www.chromestatus.com/>.
>>>>>>>>
>>>>>>>> --
>>>>>>>> You received this message because you are subscribed to the Google
>>>>>>>> Groups "blink-dev" group.
>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>> To view this discussion on the web visit
>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com
>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eQJqk4Uss3_3fVmskEsPfVXF404Jfgp-17k60kkJkA5g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>> .
>>>>>>>>
>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eDM1eK9fRSNHyHM81JRWyb0KXeG3POX%2Bq7Zvn0LHDnBw%40mail.gmail.com.

Reply via email to