Contact emailsdavid...@chromium.org, dadr...@google.com

Specificationhttps://datatracker.ietf.org/doc/rfc8446

Design docs
https://docs.google.com/document/d/1NIeWj_xFE3p7Q2IxVjnztO4_Aqih3VAskHlLYqDFjvk/edit?resourcekey=0-FCsdas1l23L830egKOun4A

https://github.com/dadrian/clienthello-randomization/blob/main/EXPLAINER.md

Summary

Randomize the order of TLS ClientHello extensions, to reduce ossification.


Blink componentInternals>Network>SSL
<https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>

TAG review

TAG review statusNot applicable

Risks


Interoperability and Compatibility

It is possible that Chrome’s ClientHello extension ordering is already
ossified. This change may cause compatibility issues with middleboxes or
other network monitoring software. We will do a slow rollout and monitor
breakage.


*Gecko*: No signal

*WebKit*: No signal

*Web developers*: No signals

*Other signals*:

Ergonomics

n/a, not developer facing


Activation

n/a, not developer facing


Security

Using a fixed extension order can encourage server implementers to
fingerprint Chrome and then assume specific implementation behavior. This
can limit ecosystem agility when Chrome implements future modifications to
TLS, if the server implementations are not prepared for Chrome to change
its ClientHello. Chrome will randomly order extensions, subject to the
pre_shared_key constraint in the RFC. This will reduce the risk of server
and middleboxes fixating on details of our current ClientHello. This should
make the TLS ecosystem more robust to changes.


WebView application risks

Does this intent deprecate or change behavior of existing APIs, such that
it has potentially high risk for Android WebView-based applications?



Goals for experimentation


Monitor breakage and complaints, if any.

Ongoing technical constraints


It is possible that the extension ordering is already ossified. This change
may cause compatibility issues with middleboxes. We will do a slow rollout
and monitor breakage.

Debuggability

n/a, inner function of TLS stack


Will this feature be supported on all six Blink platforms (Windows, Mac,
Linux, Chrome OS, Android, and Android WebView)?Yes

Is this feature fully tested by web-platform-tests
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
?No

Flag name

Requires code in //chrome?False

Tracking bughttps://bugs.chromium.org/p/chromium/issues/detail?id=1351809

Estimated milestones
DevTrial on desktop 106
DevTrial on Android 106

Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5124606246518784

This intent message was generated by Chrome Platform Status
<https://chromestatus.com/>.

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42KXQZFnVm0AqCwAAQr2CgOoOBpKJBkZKeMdGUzvQWhOfw%40mail.gmail.com.

Reply via email to