LGTM2 for step 1.
On 12/6/21 5:31 AM, Titouan Rigoudy wrote:
*assuming I get 2 more LGTMs, that is.
On Mon, Dec 6, 2021 at 11:31 AM Titouan Rigoudy <tito...@google.com>
wrote:
Thanks! I'll come back for further discussion with UKM data in hand.
Cheers,
Titouan
On Mon, Dec 6, 2021 at 10:58 AM Yoav Weiss
<yoavwe...@chromium.org> wrote:
I agree UKM analysis should not block step 1, as it holds
little risk. (There's still some risks that servers will choke
in the face of preflights, but that seems minor compared to
the enforcement risk)
Therefore,*LGTM1 for step 1* (preflights with no enforcement),
but not further (yet). Please come back to this thread with
any data you may have as a result of adding UKMs.
On Fri, Dec 3, 2021 at 6:44 PM 'Titouan Rigoudy' via blink-dev
<blink-dev@chromium.org> wrote:
Yoav, do you think UKM analysis should block sending
preflights without enforcing their success? I believe
sending these will allow us to get more precise
information on the affected websites through the
usecounter recorded in crrev.com/c/3310846
<http://crrev.com/c/3310846>. I can then analyze UKM data
and use the results to inform the decision whether and
when to switch enforcement on?
Cheers,
Titouan
On Thu, Dec 2, 2021 at 5:19 PM Titouan Rigoudy
<tito...@google.com> wrote:
I agree!
Cheers,
Titouan
On Thu, Dec 2, 2021 at 5:17 PM Mike West
<mk...@chromium.org> wrote:
_I_ don't think we should do that, but I'd defer
to Titouan's preference. :)
-mike
On Thu, Dec 2, 2021 at 5:14 PM Mike Taylor
<miketa...@chromium.org> wrote:
Thanks - I also don't think there's a lot of
value in this particular header being the
odd-one-out, just wanted to confirm we're not
going to ship "true" first and try to change
that to ?1 later (which is always challenging).
On 12/2/21 11:11 AM, Mike West wrote:
I'm not sure it makes sense to introduce a
structured header here, given that it's
layering on top of CORS headers that I don't
think there's substantial interest in changing.
-mike
On Thu, Dec 2, 2021 at 4:55 PM 'Titouan
Rigoudy' via blink-dev
<blink-dev@chromium.org> wrote:
Hi Mike,
There is no support for structured
headers so far, for consistency reasons,
and there has been no movement to
deprecate the "true" value for
Access-Control-Allow-Credentials. The
value of such a deprecation seems minimal.
I could pretty easily add support for the
structured "?1" value on top of the
"true" token for the new
Access-Control-Allow-Private-Network
header, and specify that, but I'm not
sure it would be terribly useful. Do you
think otherwise?
Cheers,
Titouan
On Thu, Dec 2, 2021 at 4:45 PM Mike
Taylor <miketa...@chromium.org> wrote:
Hi Titouan,
I'm curious what the plan is for
structured headers.
https://github.com/WICG/private-network-access/issues/45
is marked as blocked - has there been
other progress or thinking behind the
scenes?
thanks,
Mike
On 11/29/21 10:36 AM, 'Titouan
Rigoudy' via blink-dev wrote:
Contact emails
tito...@chromium.org,
v...@chromium.org, cl...@chromium.org
Explainer
https://github.com/WICG/private-network-access/blob/main/explainer.md
Specification
https://wicg.github.io/private-network-access/
Design docs
https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit
Summary
Sends a CORS preflight request ahead
of any private network requests for
subresources, asking for explicit
permission from the target server. A
private network request is any
request from a public website to a
private IP address or localhost, or
from a private website (e.g.
intranet) to localhost. Sending a
preflight request mitigates the risk
of cross-site request forgery
attacks against private network
devices such as routers, which are
often not prepared to defend against
this threat.
Blink component
Blink>SecurityFeature>CORS>PrivateNetworkAccess
<https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS%3EPrivateNetworkAccess>
TAG review
https://github.com/w3ctag/design-reviews/issues/572
TAG review status
Pending
Risks
Interoperability and
Compatibility
The main interoperability risk, as
always, is if other browser engines
do not implement this. Compat risk
is straightforward: web servers that
do not handle the new preflight
requests will eventually break, once
the feature ships. The plan to
address this is as follows: 1. Send
preflight request, ignore result,
always send actual request. Failed
preflight requests will result in a
warning being shown in devtools. 2.
Wait for 3 milestones. 3. Gate
actual request on preflight request
success, with deprecation trial for
developers to buy some more time. 4.
End deprecation trial 4 milestones
later. UseCounters:
https://chromestatus.com/metrics/feature/timeline/popularity/3753
https://chromestatus.com/metrics/feature/timeline/popularity/3755
https://chromestatus.com/metrics/feature/timeline/popularity/3757
The above measure pages that make at
least one private network request
for which we would now send a
preflight request.
Gecko: Worth prototyping
(https://github.com/mozilla/standards-positions/issues/143)
WebKit: No signal
(https://lists.webkit.org/pipermail/webkit-dev/2021-November/032040.html)
Pending response.
Web developers: No signals Anecdotal
evidence so far suggests that most
web developers are OK with this new
requirement, though some do not
control the target endpoints and
would be negatively impacted.
Other signals:
Ergonomics
None.
Activation
Gating access to the private network
overnight on preflight requests
would likely result in widespread
breakage. This is why the plan is to
first send requests but not act on
their result, giving server
developers time to implement code
handling these requests. Deprecation
warnings will be surfaced in
DevTools to alert web/client
developers when the potential for
breakage later on is detected.
Enforcement will be turned on later
(aiming for 3 milestones), along
with a deprecation trial for
impacted web developers to buy
themselves some more time.
Experience suggests a large fraction
of developers will not notice the
advance deprecation warnings until
things break.
Security
This change aims to be
security-positive, preventing CSRF
attacks against soft and juicy
targets such as router admin
interfaces. DNS rebinding threats
were of particular concern during
the design of this feature:
https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit#heading=h.189j5gnadts9
Debuggability
Relevant information (client and
resource IP address space) is
already piped into the DevTools
network panel. Deprecation warnings
and errors will be surfaced in the
DevTools issues panel explaining the
problem when it arises.
Is this feature fully tested
by web-platform-tests
<https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>?
Yes
DevTrial instructions
https://github.com/WICG/private-network-access/blob/main/HOWTO.md
Flag name
PrivateNetworkAccessRespectPreflightResults
Requires code in //chrome?
False
Tracking bug
https://crbug.com/591068
Launch bug
https://crbug.com/1274149
Estimated milestones
DevTrial on desktop 98
DevTrial on android 98
Link to entry on the Chrome
Platform Status
https://chromestatus.com/feature/5737414355058688
Links to previous Intent
discussions
Intent to prototype:
https://groups.google.com/a/chromium.org/g/blink-dev/c/PrB0xnNxaHs/m/jeoxvNjXCAAJ
This intent message was generated by
Chrome Platform Status
<https://www.chromestatus.com/>.
--
You received this message because
you are subscribed to the Google
Groups "blink-dev" group.
To unsubscribe from this group and
stop receiving emails from it, send
an email to
blink-dev+unsubscr...@chromium.org.
To view this discussion on the web
visit
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com?utm_medium=email&utm_source=footer>.
--
You received this message because you are
subscribed to the Google Groups
"blink-dev" group.
To unsubscribe from this group and stop
receiving emails from it, send an email
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to
the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails
from it, send an email to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to the Google Groups
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6e557fb7-5b1d-20bc-aae5-65526ca8efb7%40chromium.org.