On Mon, May 2, 2022 at 8:38 PM Jerilyn D. <d.jeri...@gmail.com> wrote:

> Are there any future plans on eventually not honoring the 
> Origin-Agent-Cluster:
> ?0 to allow setting document.domain ? Or will this header always be honored
> ?
>

There is no plan for dropping the Origin-Agent-Cluster header, or the
Origin-Agent-Cluster: ?0 value in particular.


> I read on another site that this Origin-Agent-Cluster: ?0 will only be
> honored in secure context (example: https://) Is this true ? Will it also
> work in http:// ?
>

That's a rather excellent question, and since the point is to preserve
existing behaviour it should also work in a non-secure context. I double
checked, and the current implementation correctly works for insecure
contexts. Please let me know if you find a bug here.

However, I didn't find any unit tests for behaviour specifically in
insecure contexts. I'll add those to ensure that the legacy behaviour will
continue to work correctly.

The information that O-A-C will only be honored in secure contexts is
partially true: Enabling per-origin clustering is indeed bound to a secure
context. But disabling - the legacy behaviour - isn't.

On Tuesday, December 14, 2021 at 6:09:07 AM UTC-8 voge...@chromium.org
> wrote:
>
>> Contact emails
>>
>>
>> *va...@chromium.org, voge...@chromium.org*Specification
>>
>>
>> *Explainer: https://github.com/mikewest/deprecating-document-domain
>> <https://github.com/mikewest/deprecating-document-domain>HTML Spec draft:
>> https://github.com/whatwg/html/compare/main...otherdaniel:dd
>> <https://github.com/whatwg/html/compare/main...otherdaniel:dd>*API spec
>>
>>
>> *Yes*Summary
>>
>>
>>
>>
>>
>>
>>
>> *Change the default behavior of the Origin-Agent-Cluster: header /
>> document.domain settability.Presently, pages within Chromium have
>> site-keyed agent clusters by default, unless the Origin-Agent-Cluster:
>> header is explicitly set to true. This accommodates pages or frames which
>> want to access each other's state, despite being on different origins (but
>> within a site). This is fine for any pages that wish to do so, but because
>> a page *might* set document.domain later on, Chromium currently must use
>> site-keyed agent clusters for *all* pages by default even though the
>> overwhelming majority of pages do not ever make use of this (mis-)feature.
>> In turn, this requires Chromium to use sites as the basis for renderer
>> process isolation (via Site Isolation), which exposes origins to same-site
>> but cross-origin attacks involving compromised renderer processes or the
>> "Spectre" family of side-channel attacks.This proposal changes the default
>> behaviour of Origin-Agent-Cluster. From a developer's point of view, the
>> new default matches "Origin-Agent-Cluster: ?1". The initial implementation
>> will use origin-keyed agent clusters for all (non-opted out) origins,
>> without changing how many processes Chromium creates. Over time, we can
>> then adapt Chromium's isolation strategy towards origin-keyed processes
>> without further affecting web-visible behaviour.The developer-visible
>> aspect of this is that for pages with origin-keyed agent clusters,
>> document.domain is no longer settable. Thus, we have marked this intent as
>> a deprecation.Note that this proposal is about the default. Both modes -
>> site-keyed or origin-keyed agent clusters - remain available to any site,
>> but origin-keyed agent clusters change from opt-in to opt-out. The current
>> behaviour remains available by setting "Origin-Agent-Cluster: ?0".*Blink
>> component
>>
>>
>> *Blink>SecurityFeature*TAG review
>>
>>
>> *https://github.com/w3ctag/design-reviews/issues/564
>> <https://github.com/w3ctag/design-reviews/issues/564>(The thread is a bit
>> unwieldy, but there do not seem to be open issues.)*Risks:
>> Interoperability and Compatibility
>>
>> *No interoperability risks.*
>>
>> Compatibility risk exists, but is fairly small as document.domain is an
>> already deprecated feature. We’ve detailed UKM metrics in place and are
>> planning to reach out to top users as soon as we’ve LGTMs for the plan.
>>
>>
>> Current usage of the document.domain: 0.05%
>> <https://chromestatus.com/metrics/feature/timeline/popularity/2544> of
>> page views rely upon document.domain to enable some cross-origin access
>> that wasn't otherwise possible. 0.24%
>> <https://chromestatus.com/metrics/feature/timeline/popularity/2543> of
>> page views block same-origin access because only one side sets
>> document.domain. Both counters can be found on
>> https://deprecate.it/#document-domain, too.
>>
>> We’ve reached out in advance to 4 of the top current users - TL;DR Most
>> of their use cases could be achieved already by different APIs e.g.
>> Audio/video autoplay in iframes by adding the ‘autoplay’ attribute, support
>> chat deployed across subdomains.
>>
>>
>> Gecko: Standards position request
>> <https://github.com/mozilla/standards-positions/issues/601>.
>> (Provisionally "worth prototyping", but is open for additional
>> comments/opinions. Mozilla representatives also participated in the TAG
>> discussion. No concrete implementation plans were given.
>>
>> WebKit:
>> https://lists.webkit.org/pipermail/webkit-dev/2021-December/032067.html
>> (No signals.)
>>
>> Web developers: No signals.
>>
>> Activation - Deprecation plan
>> M98 - Add the devtools issue and warning incl. a web.dev blog post to
>> guide adoption
>>
>> *M98-M100 - Monitor use counters and reach out to current usersM101 -
>> Deprecate the feature by default. No reverse-origin trial is planned as the
>> ‘Origin-Agent-Cluster’ http header can be used to gain access to the
>> feature. SecurityThis change should be security-positive, since setting the
>> document.domain will not have any impact on the origin of the document any
>> more.*
>> Debuggability
>>
>>
>> *A deprecation warning will be added to DevTools console and to the
>> issues panel in M98, which will support current users to adopt. This
>> warning will file a deprecation report as well using the Reporting API, if
>> so configured.*Will this feature be supported on all six Blink platforms
>> (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
>>
>>
>> *Yes*Is this feature fully tested by web-platform-tests
>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>> ?
>>
>>
>> *Are in place to test the current functionality
>> <https://wpt.live/html/browsers/origin/origin-keyed-agent-clusters/>, and
>> will be adjusted within the M101 timeframe to ensure the feature is working
>> as intended.*Tracking bug
>>
>>
>> *https://crbug.com/1139851 <https://crbug.com/1139851>*Launch bug
>>
>>
>> *https://crbug.com/1246823 <https://crbug.com/1246823>*Link to entry on
>> the Chrome Platform Status
>>
>> https://chromestatus.com/feature/5428079583297536 (document.domain
>> setter deprecation)
>> https://chromestatus.com/features/5683766104162304 (Origin-keyed agent
>> clusters)
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALG6KPMhS1fb-yq6KRXcDgKBUbEE2LQqHJGxnOoJo%2BA-_KNznQ%40mail.gmail.com.

Reply via email to