3 are needed

On Thu, Aug 26, 2021, 17:53 Matt Menke <mme...@google.com> wrote:

> Is one LGTM enough for intent-to-deprecates, or do I need 3?
>
> On Mon, Aug 23, 2021 at 3:50 AM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
>> Seems like we've got a positive signal from Mozilla, along with a spec
>> bug <https://github.com/whatwg/url/issues/632>.
>>
>> LGTM1 to remove, while fixing that issue in spec (and potentially in
>> implementation)
>>
>> On Sun, Aug 22, 2021 at 10:52 PM Matt Menke <mme...@google.com> wrote:
>>
>>> Sorry, that should be "before instantiating content" (Or "before calling
>>> ContentMain")
>>>
>>> On Sun, Aug 22, 2021 at 4:51 PM Matt Menke <mme...@google.com> wrote:
>>>
>>>> I've poked around here, and I'm not sure it's possible to wire this up
>>>> to a base::Feature.  Headless runs some code before instantiating context,
>>>> including parsing a remote debugging IP address from the command line.
>>>> This results in calling the IPv4 parser before content, and thus the global
>>>> feature list, is loaded, which results in the feature code CHECKing.  Even
>>>> if we figured out a way to work around this, I'm concerned that other code
>>>> not exercised by the trybots may be doing the same thing, which could
>>>> result in a lot of unexpected surprises.
>>>>
>>>> I guess we could add a command line switch to bypass the check, though
>>>> that's more difficult to use than a base::Feature, and can't be set
>>>> server-side. Open to other ideas.
>>>>
>>>> On Fri, Aug 20, 2021 at 10:16 AM Matt Menke <mme...@google.com> wrote:
>>>>
>>>>> On second thought, doesn't seem to be any benefit to a partial rollout
>>>>> on prerelease channels, so probably just land it with an enabled by 
>>>>> default
>>>>> base::Feature.
>>>>>
>>>>> On Fri, Aug 20, 2021 at 7:57 AM Matt Menke <mme...@google.com> wrote:
>>>>>
>>>>>> I'm planning to ship it behind a feature (enabled by default, after
>>>>>> experimenting on pre-release channels) to allow emergency disabling.
>>>>>>
>>>>>> On Fri, Aug 20, 2021 at 12:53 AM Yoav Weiss <yoavwe...@chromium.org>
>>>>>> wrote:
>>>>>>
>>>>>>> OK, I'm convinced that these are not "real" hosts, and that breaking
>>>>>>> them will not result in actual user-visible breakage. Would it be 
>>>>>>> possible
>>>>>>> to ship this with a server-side flag that'd enable us to quickly revert 
>>>>>>> in
>>>>>>> case we're wrong?
>>>>>>>
>>>>>>> On Thu, Aug 19, 2021 at 6:09 PM Matt Menke <mme...@google.com>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> So given information on this thread, I think the ways these can
>>>>>>>> succeed are possibly:
>>>>>>>> 1)  Entries in the HOSTS file.
>>>>>>>> 2)  Intermediary DNS servers or MitMs typo squatting, or actively
>>>>>>>> attacking the user.
>>>>>>>> 3)  Local DNS servers providing additional DNS results.
>>>>>>>> 4)  Suffix search (which would trigger on, e.g., "1533.67.89" but
>>>>>>>> not "67.89.1533")
>>>>>>>> 5)  mDNS
>>>>>>>> 6)  Local tools injecting DNS lookup results.
>>>>>>>>
>>>>>>>> Unfortunately, we don't have a good way to gather hard data on
>>>>>>>> which are more common.  Given that there are potential security
>>>>>>>> implications here, I'm reluctant to wait for another round of data
>>>>>>>> gathering, though we could probably distinguish cases 4) and 5) from 
>>>>>>>> the
>>>>>>>> others, and 1) as well, at least on some platforms.  Also not sure how
>>>>>>>> useful just knowing about those cases would be.
>>>>>>>> On Thursday, August 19, 2021 at 11:54:29 AM UTC-4 Harald Alvestrand
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> Thanks - I misremembered which end of the class B network got
>>>>>>>>> jammed together. 67.89.31533 is indeed the one that is "legal" 
>>>>>>>>> syntax, and
>>>>>>>>> so of course 67.89.1 is too.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Thu, Aug 19, 2021 at 3:20 PM Matt Menke <mme...@google.com>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Note that 127.0.1 is mapped to 127.0.0.1 by GURL, following the
>>>>>>>>>> URL spec, so that would generally not make it to the DNS resolver 
>>>>>>>>>> (unless
>>>>>>>>>> something tried to resolve it directly).  Per the URL spec, 
>>>>>>>>>> "31533.67.89"
>>>>>>>>>> would not be normalized by GURL, but "67.89.31533" would be 
>>>>>>>>>> converted to
>>>>>>>>>> 67.89.123.45.  My instrumentation was at the DNS layer, so "127.0.1" 
>>>>>>>>>> and
>>>>>>>>>> "67.89.31533" would not show up as problematic hostnames in my 
>>>>>>>>>> metrics,
>>>>>>>>>> though "31533.67.89" would.
>>>>>>>>>>
>>>>>>>>>> On Thu, Aug 19, 2021 at 9:10 AM Harald Alvestrand <
>>>>>>>>>> h...@google.com> wrote:
>>>>>>>>>>
>>>>>>>>>>> An interesting property of all-numeric hostnames is that they
>>>>>>>>>>> *may* be legitimate IPv4 addresses using highly archaic IP address 
>>>>>>>>>>> formats
>>>>>>>>>>> - we're so used to the 123.45.67.89 syntax that we forget that 
>>>>>>>>>>> 31533.67.89
>>>>>>>>>>> once was regarded as a legitimate way to encode the same address 
>>>>>>>>>>> (class B
>>>>>>>>>>> notation).
>>>>>>>>>>>
>>>>>>>>>>> There are also certain resolvers that will "helpfully" map an
>>>>>>>>>>> all-numeric hostname presented in DNS to an IP address without 
>>>>>>>>>>> asking
>>>>>>>>>>> anyone.
>>>>>>>>>>> So if those two bugs (or "archaic features") occur together, the
>>>>>>>>>>> result may be a successful resolution.
>>>>>>>>>>>
>>>>>>>>>>> No idea why it would occur more often on Android than on
>>>>>>>>>>> Windows, though. And my Linux boxes don't resolve 127.0.1 to 
>>>>>>>>>>> anything.
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:42 PM Yoav Weiss <yoav...@chromium.org>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Interesting! What happens then in the "successful resolution"
>>>>>>>>>>>> case Matt mentioned?
>>>>>>>>>>>>
>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:39 PM Harald Alvestrand <
>>>>>>>>>>>> h...@google.com> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Department of odd facts:
>>>>>>>>>>>>>
>>>>>>>>>>>>> - The ICANN rules for new TLDs forbid all top level domain
>>>>>>>>>>>>> names that start with a digit
>>>>>>>>>>>>> - The IDNA rules for bidirectional scripts forbid domain names
>>>>>>>>>>>>> that start with a digit (Unicode bidi afficandoes will know why)
>>>>>>>>>>>>> - The only real reason why leading digits aren't outlawed in
>>>>>>>>>>>>> domain names at the second level is 3com.
>>>>>>>>>>>>>
>>>>>>>>>>>>> It seems safe to say that no legitimate fully qualified
>>>>>>>>>>>>> hostname will ever have a last component consisting only of 
>>>>>>>>>>>>> digits.
>>>>>>>>>>>>> That means the only time we could get a legitimate hostname is
>>>>>>>>>>>>> for something that has to be resolved via a search path.
>>>>>>>>>>>>>
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:33 PM Yoav Weiss <
>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:28 PM Matt Menke <mme...@google.com>
>>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> I created the title using Chrome Status's deprecation
>>>>>>>>>>>>>>> template, so any confusion should be blamed on that.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> +Jason Robbins - on the title issues.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> I used the "Draft Intent to Deprecate and Remove email"
>>>>>>>>>>>>>>> button, and assume I'd need to do a "Draft Intent to Ship 
>>>>>>>>>>>>>>> email" before
>>>>>>>>>>>>>>> shipping to stable, after a 50% trial on prerelease channels.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> There's no need for 2 emails for removals. We can discuss the
>>>>>>>>>>>>>> full deprecation, experimentation/trials and removal on stable 
>>>>>>>>>>>>>> here.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:15 AM Yoav Weiss <
>>>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:36 PM Matt Menke <
>>>>>>>>>>>>>>>> mme...@google.com> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 5:23 PM Yoav Weiss <
>>>>>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:18 PM Matt Menke <
>>>>>>>>>>>>>>>>>> mme...@google.com> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 4:53 PM Yoav Weiss <
>>>>>>>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 8:47 PM 'Matt Menke' via
>>>>>>>>>>>>>>>>>>>> blink-dev <blin...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Contact emailsmme...@google.com
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> ExplainerNone
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Specificationhttps://url.spec.whatwg.org/
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but
>>>>>>>>>>>>>>>>>>>>> end in numbers are treated as valid, and looked up via 
>>>>>>>>>>>>>>>>>>>>> DNS (e.g.,
>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/). Per the Public Suffix List spec,
>>>>>>>>>>>>>>>>>>>>> the eTLD+1 of the hostname in that URL should be "127.1". 
>>>>>>>>>>>>>>>>>>>>> If that is ever
>>>>>>>>>>>>>>>>>>>>> fed back into a URLs, "http://127.1/
>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/>" is mapped to "http://127.0.0.1/";
>>>>>>>>>>>>>>>>>>>>> by the URL spec, which seems potentially dangerous. 
>>>>>>>>>>>>>>>>>>>>> "127.0.0.0.1" could
>>>>>>>>>>>>>>>>>>>>> also potentially be used to confuse users. We want to 
>>>>>>>>>>>>>>>>>>>>> reject URLs with
>>>>>>>>>>>>>>>>>>>>> these hostnames.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Blink componentInternals>Network>DNS
>>>>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3EDNS>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Motivation
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but
>>>>>>>>>>>>>>>>>>>>> end in numbers are treated as valid hostnames, and looked 
>>>>>>>>>>>>>>>>>>>>> up via DNS.
>>>>>>>>>>>>>>>>>>>>> Example hostnames: 127.0.0.0.1, foo.0.1, 10.0.0.09, 
>>>>>>>>>>>>>>>>>>>>> 08.1.2.3. These can be
>>>>>>>>>>>>>>>>>>>>> problematic for the following reason: * "
>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/"; has an eTLD+1 of "127.1", per the
>>>>>>>>>>>>>>>>>>>>> public suffix list spec. If that's ever used as the 
>>>>>>>>>>>>>>>>>>>>> hostname in a new URL,
>>>>>>>>>>>>>>>>>>>>> however, as in "http://127.1 <http://127.0.0.1/>", it
>>>>>>>>>>>>>>>>>>>>> will then get mapped to "http://127.0.0.1/";, per the
>>>>>>>>>>>>>>>>>>>>> URL spec, which is a different host, which is not safe. * 
>>>>>>>>>>>>>>>>>>>>> "
>>>>>>>>>>>>>>>>>>>>> http://127.0.0.0.1"; and "http://1.2.3.09";, both of
>>>>>>>>>>>>>>>>>>>>> which are looked up via DNS rather than failing or being 
>>>>>>>>>>>>>>>>>>>>> treated as IPv4
>>>>>>>>>>>>>>>>>>>>> hostnames, also seem potentially confusing. While no 
>>>>>>>>>>>>>>>>>>>>> exploit is currently
>>>>>>>>>>>>>>>>>>>>> known here, we want to remove support for these as a 
>>>>>>>>>>>>>>>>>>>>> preventative security
>>>>>>>>>>>>>>>>>>>>> measure. The URL spec has been updated so that any URL 
>>>>>>>>>>>>>>>>>>>>> with a hostname
>>>>>>>>>>>>>>>>>>>>> ending in a number that's not an IPv4 address (including, 
>>>>>>>>>>>>>>>>>>>>> e.g.,
>>>>>>>>>>>>>>>>>>>>> http://foo.1./, but not http://foo.1../) is
>>>>>>>>>>>>>>>>>>>>> considered invalid. Since this is part of the URL spec, 
>>>>>>>>>>>>>>>>>>>>> not the DNS spec,
>>>>>>>>>>>>>>>>>>>>> we want to reject these URLs are the GURL layer, for URLs 
>>>>>>>>>>>>>>>>>>>>> with appropriate
>>>>>>>>>>>>>>>>>>>>> protocols (http, https, ws, wss, file). For consistency, 
>>>>>>>>>>>>>>>>>>>>> we should also
>>>>>>>>>>>>>>>>>>>>> fail DNS lookup attempts of these sorts of hostnames.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Initial public proposal
>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> TAG reviewNot required for an Intent to Deprecate, I
>>>>>>>>>>>>>>>>>>>>> believe.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> TAG review statusNot applicable
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Any URL with an affected hostname will fail to load,
>>>>>>>>>>>>>>>>>>>>> and will need to be migrated to another hostname. URLs of 
>>>>>>>>>>>>>>>>>>>>> this form do
>>>>>>>>>>>>>>>>>>>>> appear to be in use, though it's not clear under what 
>>>>>>>>>>>>>>>>>>>>> circumstances. No
>>>>>>>>>>>>>>>>>>>>> entry in the public suffix list is affected. Affected 
>>>>>>>>>>>>>>>>>>>>> URLs make up no more
>>>>>>>>>>>>>>>>>>>>> than 0.0003% of hostnames looked up via the host resolver 
>>>>>>>>>>>>>>>>>>>>> on any platform,
>>>>>>>>>>>>>>>>>>>>> and are basically not used in any file URLs, according to 
>>>>>>>>>>>>>>>>>>>>> our metrics.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Do we have reason to believe these hostnames are not
>>>>>>>>>>>>>>>>>>>> legitimate ones?
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Unfortunately, we have no insight into them - they could
>>>>>>>>>>>>>>>>>>> be mistyped URLs sent to typo squatting ISPs that OSX lets 
>>>>>>>>>>>>>>>>>>> through but the
>>>>>>>>>>>>>>>>>>> Windows host resolver blocks, and various flavors of Linux 
>>>>>>>>>>>>>>>>>>> treat
>>>>>>>>>>>>>>>>>>> differently.  Or they could be mapped via a hosts file, or 
>>>>>>>>>>>>>>>>>>> they could be
>>>>>>>>>>>>>>>>>>> hostnames that only resolve on public networks.  Could be 
>>>>>>>>>>>>>>>>>>> some network tool
>>>>>>>>>>>>>>>>>>> that uses them when installed locally, but is only 
>>>>>>>>>>>>>>>>>>> available on certain
>>>>>>>>>>>>>>>>>>> platforms.  No reason to think one possibility is more 
>>>>>>>>>>>>>>>>>>> likely than the
>>>>>>>>>>>>>>>>>>> others.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Do we have UKM for them that would enable us to test a
>>>>>>>>>>>>>>>>>> random sample?
>>>>>>>>>>>>>>>>>> I'm concerned about blocking those hostnames if they are
>>>>>>>>>>>>>>>>>> legitimate, as that's something that a web developer can't 
>>>>>>>>>>>>>>>>>> do anything
>>>>>>>>>>>>>>>>>> about.
>>>>>>>>>>>>>>>>>> So even if the number of hosts is small, I'd like to get
>>>>>>>>>>>>>>>>>> more certainty that they are *not* legitimate hosts before 
>>>>>>>>>>>>>>>>>> blocking them.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> We have UKM on their number (0.0003% of DNS lookups on
>>>>>>>>>>>>>>>>> OSX, less elsewhere - we can't meaningfully instrument 
>>>>>>>>>>>>>>>>> percent of
>>>>>>>>>>>>>>>>> created GURLs), but we don't have their hostnames, what they 
>>>>>>>>>>>>>>>>> resolve to, or
>>>>>>>>>>>>>>>>> know anything else about them, unfortunately.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Navigation to a subset of these as frame URLs were broken
>>>>>>>>>>>>>>>>> at one point - I'm pretty sure the breakage even made it to 
>>>>>>>>>>>>>>>>> stable:
>>>>>>>>>>>>>>>>> https://crbug.com/1173238.  There were no reports of
>>>>>>>>>>>>>>>>> problems.  Only non-IPv4 URLs where the last two components 
>>>>>>>>>>>>>>>>> were broken,
>>>>>>>>>>>>>>>>> though, and it didn't affect subresources.  On OSX and 
>>>>>>>>>>>>>>>>> Android, over 99% of
>>>>>>>>>>>>>>>>> successfully resolved problematic hostnames fit into that 
>>>>>>>>>>>>>>>>> bucket, though on
>>>>>>>>>>>>>>>>> Linux, only about 2% do.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> That doesn't give us any hard conclusions, except they're
>>>>>>>>>>>>>>>>> either not deliberate navigations on OSX/Android, or they're 
>>>>>>>>>>>>>>>>> not
>>>>>>>>>>>>>>>>> navigations.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> :|
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> One more question: Is this an intent to Prototype or an
>>>>>>>>>>>>>>>> intent to deprecate? The title is a bit unclear..
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On OSX and Android, about 90% of host resolver lookups
>>>>>>>>>>>>>>>>>>>>> for these hostnames succeed, 60% do on Linux, and 2% on 
>>>>>>>>>>>>>>>>>>>>> Windows and
>>>>>>>>>>>>>>>>>>>>> ChromeOS.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Do you know where those failures are coming from?
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Could be typos, could be the Windows and ChromeOS host
>>>>>>>>>>>>>>>>>>> resolvers don't let them through.  Since we've had no filed 
>>>>>>>>>>>>>>>>>>> bugs about
>>>>>>>>>>>>>>>>>>> them, I suspect the failures are not deliberate navigations 
>>>>>>>>>>>>>>>>>>> or intended
>>>>>>>>>>>>>>>>>>> network requests.  I'm much more interested in where the 
>>>>>>>>>>>>>>>>>>> successes are
>>>>>>>>>>>>>>>>>>> coming from, myself.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> To allow for emergency disabling in case of wider than
>>>>>>>>>>>>>>>>>>>>> expected breakage, I intend to add a feature for it, and 
>>>>>>>>>>>>>>>>>>>>> do a 50% field
>>>>>>>>>>>>>>>>>>>>> trial on pre-release channels, though plan to just enable 
>>>>>>>>>>>>>>>>>>>>> the feature,
>>>>>>>>>>>>>>>>>>>>> rather than do a gradual rollout to stable, given the low 
>>>>>>>>>>>>>>>>>>>>> usage.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Gecko: Positive (
>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619#issuecomment-890826499
>>>>>>>>>>>>>>>>>>>>> <https://www.chromestatus.com/admin/features/launch/5679790780579840/1?intent=1>
>>>>>>>>>>>>>>>>>>>>> )
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Can you file an official position request?
>>>>>>>>>>>>>>>>>>>> https://bit.ly/blink-signals
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Done for Mozilla:
>>>>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/568
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Should I also do this for WebKit as well?  They have in
>>>>>>>>>>>>>>>>>>> process CLs, so not sure if it's still needed.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Agree that in-flight patches for WebKit are a sufficient
>>>>>>>>>>>>>>>>>> positive signal.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> WebKit: In development (
>>>>>>>>>>>>>>>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=228826)
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Web developers: No signals
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Activation
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> This breaks anything using one of these domains, and
>>>>>>>>>>>>>>>>>>>>> requires migrating to other hostnames.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Security
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> None
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> These will act like any other invalid URL. Behavior is
>>>>>>>>>>>>>>>>>>>>> context dependent. Since this is logic deep within GURL, 
>>>>>>>>>>>>>>>>>>>>> and GURLs are
>>>>>>>>>>>>>>>>>>>>> created in a great many places, console warnings 
>>>>>>>>>>>>>>>>>>>>> specifically for this seem
>>>>>>>>>>>>>>>>>>>>> not practical.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>>>>>>>>> ?No.  Javascript URL construction is tested, but URLs
>>>>>>>>>>>>>>>>>>>>> are used in a great many other places, which don't have 
>>>>>>>>>>>>>>>>>>>>> test
>>>>>>>>>>>>>>>>>>>>> coverage, since DNS lookups for these domains must 
>>>>>>>>>>>>>>>>>>>>> succeed in the first
>>>>>>>>>>>>>>>>>>>>> place for the tests to be meaningful.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Flag name
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Requires code in //chrome?False
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Tracking bughttps://crbug.com/1237032
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>>>>>>>> DevTrial on desktop 95
>>>>>>>>>>>>>>>>>>>>> DevTrial on Webview 95
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5679790780579840
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome Platform
>>>>>>>>>>>>>>>>>>>>> Status <https://www.chromestatus.com/>.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>> You received this message because you are subscribed
>>>>>>>>>>>>>>>>>>>>> to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from
>>>>>>>>>>>>>> it, send an email to blink-dev+...@chromium.org.
>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com
>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>
>>>>>>>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWDjPt7vJ8pK0H65byTLMV7jNTBdA4pOpLUAg3%2B26jW8Q%40mail.gmail.com.

Reply via email to