Hi Andrew, M96 has now shipped. Is the UseCounter data now available?
On Thu, Nov 4, 2021 at 7:33 PM Andrew Williams <awil...@chromium.org> wrote: > Hi Daniel, > > Thanks for following up on this. UMA metrics to count the prevalence of > \x00, \x0d, and \x0a characters in cookie strings will roll out with the > M96 release. We'll post back here once those metrics are available. > > Regarding deprecation warnings, we've mapped out how to generate DevTools > Issues that would warn developers when cookies containing these characters > are detected, but we haven't implemented anything yet. Also, we haven't > implemented the sending of deprecation reports yet. Both are still on our > radar, though. > > -Andrew > > On Thu, Nov 4, 2021 at 2:37 PM Daniel Bratell <bratel...@gmail.com> wrote: > >> The last thing happening in this thread was that we decided to wait for >> data. What is the current status of those usecounters, have they reached >> the user base now? >> >> /Daniel >> On 2021-09-20 07:59, Yoav Weiss wrote: >> >> >> >> On Fri, Sep 17, 2021 at 6:36 PM Steven Bingler <bing...@chromium.org> >> wrote: >> >>> Hi Ian and Yoav, >>> >>> I believe the general guidance now for warning users of some change is >>> to use DevTools Issues rather than console warnings. Would using Issues, >>> instead of console warnings, be acceptable to you? (This would be in >>> addition to the reports.) >>> >> >> I don't believe the API OWNERS have a stand on console warnings vs. >> issues for deprecations. Whatever is the general guidance that will make >> this visible for developers seems good to me, assuming that issues are >> prominent in the UI and manage to grab the median developer's attention. >> >> >>> Also, for posterity, it is possible to emit a console warning starting >>> from EmitCookieWarningsAndMetrics() with a little work. We used to do just >>> that for SameSite warnings before we transitioned them to DevTools Issue [ >>> 1 >>> <https://chromium.googlesource.com/chromium/src.git/+/1cc31f46c2e6ae658a97b92fbc8c556eba382d3e/content/browser/frame_host/cookie_utils.cc#128>] >>> [2 >>> <https://chromium.googlesource.com/chromium/src.git/+/1cc31f46c2e6ae658a97b92fbc8c556eba382d3e/content/browser/frame_host/render_frame_host_impl.cc#8309>] >>> (many refactors ago). It looks like most of the necessary functions still >>> exist, so it shouldn't be too hard to recreate that functionality if >>> needed. >>> >> >>> Thanks, >>> Steven >>> >>> On Friday, September 17, 2021 at 8:45:10 AM UTC-7 Andrew Williams wrote: >>> >>>> Thanks for the feedback Mike, Yoav, and Ian. I will explore the >>>> feasibility of using CountDeprecation (or something similar) from the >>>> cookie-related code and will report back once I have an update on this. >>>> >>>> -Andrew >>>> >>>> On Fri, Sep 10, 2021 at 10:11 AM Ian Clelland <iclell...@chromium.org> >>>> wrote: >>>> >>>>> That looks right -- that code path won't get you anywhere near adding >>>>> a console message, as far as I can tell, but you would be able to queue a >>>>> report that way. Ideally, we'd have something like deprecation.cc for >>>>> browser-side that would handle the UMA as well as formatting the report >>>>> body consistently. As a first pass, until we have more that one >>>>> browser-generated deprecation report, just generating and queuing it would >>>>> work. >>>>> >>>>> On Fri, Sep 10, 2021 at 6:42 AM Yoav Weiss <yoavwe...@chromium.org> >>>>> wrote: >>>>> >>>>>> I may very well be wrong, but it seems like >>>>>> CookieUtils::EmitCookieWarningsAndMetrics >>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:content/browser/renderer_host/cookie_utils.cc;l=97;drc=8afc9e45a7e96afda8f22ef044d1e7cdc5a6f75a;bpv=1;bpt=1> >>>>>> has >>>>>> the right plumbing to reach RenderFrameHost, and from it, get a >>>>>> ReportingSource >>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:content/browser/renderer_host/render_frame_host_impl.cc;l=1730;drc=8afc9e45a7e96afda8f22ef044d1e7cdc5a6f75a?q=RenderFrameHost&ss=chromium%2Fchromium%2Fsrc> >>>>>> that >>>>>> can enable us to send >>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:content/browser/renderer_host/render_frame_host_impl.cc;l=10676;drc=8afc9e45a7e96afda8f22ef044d1e7cdc5a6f75a;bpv=1;bpt=1?q=RenderFrameHost&ss=chromium%2Fchromium%2Fsrc> >>>>>> deprecation reports (even if through a different mechanism than >>>>>> CountDeprecation). >>>>>> >>>>>> Ian - thoughts on the above? >>>>>> >>>>>> On Thu, Sep 9, 2021 at 9:21 PM Mike West <mk...@chromium.org> wrote: >>>>>> >>>>>>> I don't think `countDeprecation` is going to work here, insofar as >>>>>>> that's a Blink-layer concept, and the network stack isn't going to have >>>>>>> an >>>>>>> understanding of page views or use counters or etc. If we've wired >>>>>>> things >>>>>>> up such that deprecation reports can be triggered from the network >>>>>>> stack, >>>>>>> lovely, but I'm not sure that's the case. >>>>>>> >>>>>>> Another approach that might be reasonable to approach might be to >>>>>>> roll this out on a percentage-basis, starting with a substantial >>>>>>> portion of >>>>>>> beta, then rolling to stable iff we're confident in that experience? >>>>>>> >>>>>>> This feels like both the right directional and philosophical thing >>>>>>> to do with cookies. I'd like to see it ship, and a staged rollout might >>>>>>> well be a reasonable way of gaining confidence in our ability to do so? >>>>>>> >>>>>>> -mike >>>>>>> >>>>>>> >>>>>>> On Thu, Sep 9, 2021 at 1:03 PM Yoav Weiss <yoavwe...@chromium.org> >>>>>>> wrote: >>>>>>> >>>>>>>> Sounds good! Can you please ping this thread once results start >>>>>>>> coming in? Thanks! :) >>>>>>>> >>>>>>>> On Wednesday, September 8, 2021 at 3:59:36 AM UTC+2 Andrew Williams >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Sounds good - we will add the CountDeprecation metrics. Thanks for >>>>>>>>> the suggestion, Yoav, and thank you Ian for the additional info. >>>>>>>>> >>>>>>>>> -Andrew >>>>>>>>> >>>>>>>>> On Fri, Sep 3, 2021 at 10:07 AM Ian Clelland < >>>>>>>>> iclell...@chromium.org> wrote: >>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Fri, Sep 3, 2021 at 4:55 AM Yoav Weiss <yoavwe...@chromium.org> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> Hey Andrew, >>>>>>>>>>> >>>>>>>>>>> Given that the metrics are not a superset of what you're trying >>>>>>>>>>> to deprecate, could you please add CountDeprecation >>>>>>>>>>> <https://source.chromium.org/chromium/chromium/src/+/main:third_party/blink/renderer/core/frame/deprecation.cc;drc=f6f22e82bcd0d50f390b23ee9688c58de5ae0bdc;bpv=1;bpt=1;l=702?q=deprecation&ss=chromium> >>>>>>>>>>> metrics of the case you are intending to deprecate? That would >>>>>>>>>>> ensure .e.g >>>>>>>>>>> deprecation reports are sent to folks that happen to have such >>>>>>>>>>> cookies. >>>>>>>>>>> Even though you haven't really asked, from my perspective, it's >>>>>>>>>>> also fine to add a console deprecation message at this point, in >>>>>>>>>>> parallel >>>>>>>>>>> to the metrics. >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> FYI, CountDeprecation will take care of adding that console >>>>>>>>>> message for you, as well as: >>>>>>>>>> - Generating a report object which can be seen with a >>>>>>>>>> ReportingObserver, >>>>>>>>>> - Sending that report to any configured endpoints for the >>>>>>>>>> document, and >>>>>>>>>> - Counting the usage for UMA, so that we can track the >>>>>>>>>> (hopefully) declining usage of the deprecated feature. >>>>>>>>>> >>>>>>>>>> Ian >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> Cheers :) >>>>>>>>>>> Yoav >>>>>>>>>>> >>>>>>>>>>> On Wednesday, September 1, 2021 at 5:05:44 PM UTC+2 Andrew >>>>>>>>>>> Williams wrote: >>>>>>>>>>> >>>>>>>>>>>> Here is the percentage for the metric mentioned in my last >>>>>>>>>>>> email: over a 7 day period, 0.00004% of cookies seen in the stable >>>>>>>>>>>> version >>>>>>>>>>>> of Chrome had truncated names and/or values. >>>>>>>>>>>> Ultimately our plan is to ship this feature behind a kill >>>>>>>>>>>> switch that we could flip if major issues are reported. With that >>>>>>>>>>>> in mind, >>>>>>>>>>>> and given the low number of truncated cookie names/values observed >>>>>>>>>>>> via our >>>>>>>>>>>> existing metrics, would it make sense to implement and collect the >>>>>>>>>>>> new >>>>>>>>>>>> metrics in parallel with rolling out the changes described in this >>>>>>>>>>>> I2P&S? >>>>>>>>>>>> Or do you think taking the more cautious approach and >>>>>>>>>>>> implementing/collecting the new metrics before landing this change >>>>>>>>>>>> is a >>>>>>>>>>>> better way forward (despite taking more time)? >>>>>>>>>>>> -Andrew >>>>>>>>>>>> >>>>>>>>>>>> On Fri, Aug 27, 2021 at 1:45 PM Andrew Williams < >>>>>>>>>>>> awil...@chromium.org> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> Thanks for the feedback/questions Yoav and Daniel. >>>>>>>>>>>>> >>>>>>>>>>>>> We have some metrics >>>>>>>>>>>>> <https://source.chromium.org/chromium/chromium/src/+/700dc7fe1578ab5e0e50a6304f2a1960005b8f8b:tools/metrics/histograms/metadata/cookie/histograms.xml;l=56;bpv=1;bpt=0> >>>>>>>>>>>>> on Chrome's existing behavior to truncate cookie lines containing >>>>>>>>>>>>> \x00, >>>>>>>>>>>>> \x0d, and \x0a (specifically, in cases where the truncation >>>>>>>>>>>>> affects the >>>>>>>>>>>>> cookie name or the cookie value). The percentage of cookies with >>>>>>>>>>>>> truncated >>>>>>>>>>>>> names or values is quite low, although I'm still waiting on >>>>>>>>>>>>> approval to >>>>>>>>>>>>> release the exact percentage. We don't have any metrics for >>>>>>>>>>>>> cases where >>>>>>>>>>>>> truncation affected cookie attribute parsing (for example, the >>>>>>>>>>>>> malicious >>>>>>>>>>>>> case this intent aims to address) or where truncation was >>>>>>>>>>>>> harmless (for >>>>>>>>>>>>> example, a newline as the last character in the cookie line), >>>>>>>>>>>>> though. >>>>>>>>>>>>> Especially for the latter case, it does seem plausible that >>>>>>>>>>>>> certain sites >>>>>>>>>>>>> could be constructing cookie lines in such a way that control >>>>>>>>>>>>> characters >>>>>>>>>>>>> slip in unnoticed. We will add new metrics to cover these cases >>>>>>>>>>>>> so that we >>>>>>>>>>>>> can better predict the level of breakage that these changes may >>>>>>>>>>>>> have. >>>>>>>>>>>>> >>>>>>>>>>>>> -Andrew >>>>>>>>>>>>> >>>>>>>>>>>>> On Thu, Aug 26, 2021 at 2:22 PM Daniel Bratell < >>>>>>>>>>>>> bratel...@gmail.com> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> Even if browsers are currently slightly incompatible, it >>>>>>>>>>>>>> seems this change will short term make them more incompatible. >>>>>>>>>>>>>> As Yoav >>>>>>>>>>>>>> said, it would be good to have an idea about how common this is, >>>>>>>>>>>>>> i.e. how >>>>>>>>>>>>>> often will cookies that are today truncated instead be rejected? >>>>>>>>>>>>>> >>>>>>>>>>>>>> /Daniel >>>>>>>>>>>>>> >>>>>>>>>>>>>> On 2021-08-25 16:18, Yoav Weiss wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>> Hey Andrew! Thanks for working on this, this seems like a >>>>>>>>>>>>>> significant compatibility gap (with security implications) that >>>>>>>>>>>>>> would be >>>>>>>>>>>>>> great to close. >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Tuesday, August 24, 2021 at 3:45:50 PM UTC+2 Andrew >>>>>>>>>>>>>> Williams wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> Contact emails awil...@chromium.org, miketa...@chromium.org >>>>>>>>>>>>>>> Explainer >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> https://github.com/httpwg/http-extensions/issues/1531 >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> https://github.com/httpwg/http-extensions/pull/1589 >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Specification >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> https://github.com/httpwg/http-extensions/blob/main/draft-ietf-httpbis-rfc6265bis.md >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Summary >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Updates how control characters in cookie data are handled. >>>>>>>>>>>>>>> Specifically, the tab character is now permitted, but all other >>>>>>>>>>>>>>> control >>>>>>>>>>>>>>> characters cause the entire cookie to be rejected (previously >>>>>>>>>>>>>>> the \x00, >>>>>>>>>>>>>>> \x0D, and \x0A characters in a cookie line caused it to be >>>>>>>>>>>>>>> truncated >>>>>>>>>>>>>>> instead of rejected entirely, which could have enabled >>>>>>>>>>>>>>> malicious behavior >>>>>>>>>>>>>>> in certain circumstances). This behavior is also in line with >>>>>>>>>>>>>>> the latest >>>>>>>>>>>>>>> drafts of RFC6265bis. >>>>>>>>>>>>>>> Blink component >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Internals>Network>Cookies >>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ECookies> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Motivation >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> In the case where attacker controlled data is used to set a >>>>>>>>>>>>>>> new cookie, having certain control characters truncate the >>>>>>>>>>>>>>> cookie line >>>>>>>>>>>>>>> could result in security-related cookie attributes being >>>>>>>>>>>>>>> ignored. This >>>>>>>>>>>>>>> behavior may also lead to cookie data corruption when control >>>>>>>>>>>>>>> characters >>>>>>>>>>>>>>> are introduced, which may cause unpredictable behavior on the >>>>>>>>>>>>>>> application >>>>>>>>>>>>>>> side (more so than cookies not being set, which is a case that >>>>>>>>>>>>>>> applications >>>>>>>>>>>>>>> should already handle). Having control characters result in the >>>>>>>>>>>>>>> whole >>>>>>>>>>>>>>> cookie being rejected helps mitigate these concerns and aligns >>>>>>>>>>>>>>> Chrome with >>>>>>>>>>>>>>> RFC6265bis. For the tab character, although it falls in the >>>>>>>>>>>>>>> control >>>>>>>>>>>>>>> character range (\x00 - \x1F, \x7F), it’s a printable character >>>>>>>>>>>>>>> and allowed >>>>>>>>>>>>>>> by other browsers. Treating it the same way that the space >>>>>>>>>>>>>>> character is >>>>>>>>>>>>>>> treated makes sense intuitively, eliminates a potential >>>>>>>>>>>>>>> fingerprinting >>>>>>>>>>>>>>> vector, and aligns Chrome with RFC6265bis. >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> In the past, moving to a stricter models that forbade certain >>>>>>>>>>>>>> characters resulted in at least some breakage of non-malicious >>>>>>>>>>>>>> content. I >>>>>>>>>>>>>> doubt this one would be significantly different. >>>>>>>>>>>>>> Do you have a sense of the resulting breakage? If not, I >>>>>>>>>>>>>> think it'd make sense to add metrics to our cookie parsing >>>>>>>>>>>>>> algorithm and >>>>>>>>>>>>>> see what that breakage would look like. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>> Initial public proposal TAG review >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> N/A >>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-api-owners-discuss/c/uBxq9uCpKx0/m/A5LI0NbyAAAJ>: >>>>>>>>>>>>>>> this change is already specified in RFC 6265bis and is a >>>>>>>>>>>>>>> relatively minor >>>>>>>>>>>>>>> change to what's already implemented in Chrome (to improve spec >>>>>>>>>>>>>>> compliance). >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> I agree that this change is in lower layers than those the >>>>>>>>>>>>>> TAG usually deals with. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>> TAG review status Not applicable >>>>>>>>>>>>>>> Risks >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> N/A >>>>>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> WebKit / Safari: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - All control characters except the tab character cause the >>>>>>>>>>>>>>> cookie to be rejected if present in the name and cause the rest >>>>>>>>>>>>>>> of the >>>>>>>>>>>>>>> cookie line to be truncated if present in the value >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Gecko / Firefox: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - 0x00 in the cookie value causes the rest of the value to >>>>>>>>>>>>>>> be truncated (but subsequent attributes are preserved) >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - 0x00 in the cookie name causes the rest of the name and >>>>>>>>>>>>>>> the value to be truncated (but subsequent attributes are >>>>>>>>>>>>>>> preserved) >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - 0x0d and 0x0a cause the entire cookie line to be >>>>>>>>>>>>>>> truncated (attributes ignored) >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - 0x01 through 0x09 (the tab character), 0x0b through 0x0c, >>>>>>>>>>>>>>> and 0x0e through 0x1f cause the cookie to be rejected if they >>>>>>>>>>>>>>> are present >>>>>>>>>>>>>>> in the name, but are allowed in the cookie value >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - 0x7f is allowed in the cookie name and cookie value >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> The following issues exist reporting these differences: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> - >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Firefox - >>>>>>>>>>>>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1702031#c1 >>>>>>>>>>>>>>> - >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> WebKit - https://bugs.webkit.org/show_bug.cgi?id=229088 >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Allowing tab characters in cookie names aligns Chrome with >>>>>>>>>>>>>>> Safari but not Firefox, and allowing tabs in the cookie value >>>>>>>>>>>>>>> aligns Chrome >>>>>>>>>>>>>>> with both. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Regarding control characters (not including tab), what will >>>>>>>>>>>>>>> change in Chrome is the handling of 0x00, 0x0d, and 0x0a >>>>>>>>>>>>>>> characters. >>>>>>>>>>>>>>> Today, Chrome truncates cookie lines when these characters are >>>>>>>>>>>>>>> encountered, >>>>>>>>>>>>>>> and this intent proposes having these characters result in >>>>>>>>>>>>>>> cookie rejection >>>>>>>>>>>>>>> instead. Rejecting cookie names containing these characters >>>>>>>>>>>>>>> aligns Chrome >>>>>>>>>>>>>>> with Safari but not Firefox, but rejecting cookie values >>>>>>>>>>>>>>> containing these >>>>>>>>>>>>>>> characters is inconsistent with existing Safari or Firefox >>>>>>>>>>>>>>> behavior. >>>>>>>>>>>>>>> However, these changes unify Chrome’s control character >>>>>>>>>>>>>>> handling behavior, >>>>>>>>>>>>>>> better align Chrome with RFC6265bis, and also help prevent a >>>>>>>>>>>>>>> class of >>>>>>>>>>>>>>> cookie attribute removal attacks (when malicious input is used >>>>>>>>>>>>>>> to build a >>>>>>>>>>>>>>> cookie line under certain conditions). >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Gecko: N/A - these changes seem too small to justify this >>>>>>>>>>>>>>> effort WebKit: N/A - these changes seem too small to >>>>>>>>>>>>>>> justify this effort >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> I somewhat agree that asking for a position here would be an >>>>>>>>>>>>>> overkill, but would love to get a signal from both Mozilla and >>>>>>>>>>>>>> Safari on >>>>>>>>>>>>>> their intents to align with the RFC. (the former seems more >>>>>>>>>>>>>> likely than the >>>>>>>>>>>>>> latter, as this seems like a CFNetwork issue) >>>>>>>>>>>>>> At the same time, the issues seem sufficient for that >>>>>>>>>>>>>> purpose, assuming folks there respond. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Web developers: N/A - these changes are relatively small and >>>>>>>>>>>>>>> are in alignment with the RFC, other browsers, and/or existing >>>>>>>>>>>>>>> behavior >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Yeah, developers are unlikely to be happy about this from a >>>>>>>>>>>>>> breakage perspective, even if it'd reduce compat issues. The >>>>>>>>>>>>>> main thing we >>>>>>>>>>>>>> can do about that is ensure breakage is minimal before shipping. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>> Debuggability >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> DevTools debugging support will be implemented along with >>>>>>>>>>>>>>> this change. Rejected response cookies are already shown in >>>>>>>>>>>>>>> DevTools in the >>>>>>>>>>>>>>> Network panel, with a status explaining why they were rejected. >>>>>>>>>>>>>>> Another >>>>>>>>>>>>>>> status will be added to annotate cookies rejected due to >>>>>>>>>>>>>>> control characters. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md> >>>>>>>>>>>>>>> ? >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> In Progress - >>>>>>>>>>>>>>> https://chromium-review.googlesource.com/c/chromium/src/+/3084521 >>>>>>>>>>>>>>> Flag name >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> UpdatedCookieControlCharacterChecks >>>>>>>>>>>>>>> Requires code in //chrome? >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> False >>>>>>>>>>>>>>> Tracking bug >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1233602 >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Estimated milestones >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> M96 >>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5709264560586752 >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Requesting approval to ship? >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Yes >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>>>>>>>>> <https://www.chromestatus.com/>. >>>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>>>> it, send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/e2de8b96-8878-47fe-99e2-5497b96c9adcn%40chromium.org >>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/e2de8b96-8878-47fe-99e2-5497b96c9adcn%40chromium.org?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>> . >>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>>>> it, send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/44805dc7-edd8-218d-dcbe-9c589509b633%40gmail.com >>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/44805dc7-edd8-218d-dcbe-9c589509b633%40gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>> . >>>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>> it, send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/fcb32661-cecb-4f5a-a29d-9f3cdfbc5395n%40chromium.org >>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/fcb32661-cecb-4f5a-a29d-9f3cdfbc5395n%40chromium.org?utm_medium=email&utm_source=footer> >>>>>>>>>>> . >>>>>>>>>>> >>>>>>>>>> -- >>>>>>>> You received this message because you are subscribed to the Google >>>>>>>> Groups "blink-dev" group. >>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>> To view this discussion on the web visit >>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/984b9bba-57f7-4145-9e1e-ee50601aae68n%40chromium.org >>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/984b9bba-57f7-4145-9e1e-ee50601aae68n%40chromium.org?utm_medium=email&utm_source=footer> >>>>>>>> . >>>>>>>> >>>>>>> -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEa0%2BkWGVtOGPxUqQfk5u5Ds9BfiR5Ks%3DjkBp8NQ9AS2w-cL9g%40mail.gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEa0%2BkWGVtOGPxUqQfk5u5Ds9BfiR5Ks%3DjkBp8NQ9AS2w-cL9g%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw_W7W%2BXYGc2mKoNgYu8GsKEsn0n67GWKuWiw6d9wYKzPw%40mail.gmail.com.