[blink-dev to bcc]

Hi José,

Thanks for reaching out, and sorry for the confusion!

To be clear, the blog post states that this would be enabled in 107 *at the
earliest*, which reflected our best estimate back when we wrote the post.

We are now aiming to ship and start a deprecation trial in 109 at the
earliest, if this thread gets 3 LGTMs by the end of next week. You can stay
tuned here to know when this will ship, or follow along on Chromestatus
[1]. The deprecation trial would allow you to request an extension until
113.

Happy to answer any other questions you may have!

Cheers,
Titouan

[1] https://chromestatus.com/feature/5737414355058688

On Mon, Oct 24, 2022 at 3:31 PM José Luis Campanello <
jose.luis.campane...@gmail.com> wrote:

> Hi all,
>
> i've been working to fix an application that will be affected by PNA
> preflights (we have an application that talks to a private server and a
> local -127.0.0.1- server).
>
> As I understood from this blog post (
> https://developer.chrome.com/blog/private-network-access-preflight/#rollout-plan),
> it seems PNA preflights will be enabled starting with release 107, but i
> can't find any reference as to whether it is being actually released in 107
> or later (I've seen 109, 112 and shipping on 113). I think I'm probably not
> understanding correctly all the details of what I'm reading.
>
> Can you confirm when this feature will enabled in the standard chrome?
>
>
> On Monday, May 30, 2022 at 6:12:42 AM UTC-3 Titouan Rigoudy wrote:
>
>> Hi there,
>>
>> Thanks for reaching out.
>>
>> Andrew: Indeed, this was crbug.com/1329248, apologies for the oversight.
>> The change has been rolled back on Friday. Chrome 102 should pick up the
>> configuration change upon restart.
>>
>> cpmtatest: by default, script fetches are made in no-cors mode with
>> credentials. I believe [1] and [2] are the relevant specification bits
>> here. If you think this should not be how PNA works, please file an issue
>> in the GitHub repo [3].
>>
>> Cheers,
>> Titouan
>>
>> [1]
>> https://html.spec.whatwg.org/multipage/urls-and-fetching.html#create-a-potential-cors-request
>> [2]
>> https://html.spec.whatwg.org/multipage/webappapis.html#fetch-a-classic-script
>> [3] https://github.com/WICG/private-network-access/issues
>>
>> On Mon, May 30, 2022 at 10:46 AM Who Cares <cpmt...@gmail.com> wrote:
>>
>>> Hi,
>>> Now when chrome 102 is out I wanted to test it so I ran it with
>>> *--enable-features=PrivateNetworkAccessRespectPreflightResults*
>>> There's one thing I'm trying to understand,
>>> I have an HTML page with a script tag, the src of this tag points to a
>>> more private network, the default behavior of script tags is not to trigger
>>> CORS and since v102 they do trigger it which is expected.
>>> My question is:
>>> I'm getting this error: *"Response to preflight request doesn't pass
>>> access control check: The value of the 'Access-Control-Allow-Credentials'
>>> header in the response is '' which must be 'true' when the request's
>>> credentials mode is 'include'."*
>>> I never asked to send credentials in my script tag, I guess I can force
>>> not send it by adding *crossorigin="" *to the tag but shouldn't the
>>> default behavior be not to send it with credentials?
>>>
>> On Saturday, May 28, 2022 at 12:47:02 AM UTC+3 Andrew Boeger wrote:
>>>
>>>> Hi all -
>>>>
>>>> Just want to call out that this assumption...
>>>> Chrome 102 should also not break anything, since we are sending
>>>> preflights in warning-only mode. If the preflight fails, a warning is
>>>> displayed in DevTools but the request proceeds as before
>>>> ... turned out to be false.
>>>>
>>>> The change recently deployed DOES break things. It has broken our
>>>> internal admin tool our CS teams use to manage customer accounts.
>>>>
>>>> Bug opened here >
>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1329248
>>>>
>>>> In meantime, I have my users moving to other browsers because this has
>>>> broken a critical function for them.
>>>>
>>>> On Wednesday, April 20, 2022 at 3:47:36 AM UTC-5 Titouan Rigoudy wrote:
>>>>
>>>>> Hi there,
>>>>>
>>>>> John: that's due to another facet of Private Network Access (not this
>>>>> intent) that started a deprecation trial in Chrome 94. See
>>>>> https://chromestatus.com/feature/5436853517811712. Unless signed up
>>>>> for the deprecation trial, HTTP websites are no longer allowed to make any
>>>>> requests to private servers.
>>>>>
>>>>> Martin: there will be no breaking change in Chrome 101. I need to
>>>>> update the blog post to make the new timeline clearer.
>>>>>
>>>>> Chrome 102 should also not break anything, since we are sending
>>>>> preflights in warning-only mode. If the preflight fails, a warning is
>>>>> displayed in DevTools but the request proceeds as before. As explained
>>>>> above, this will remain the case until at least Chrome 105, at which point
>>>>> we may turn on enforcement: when a preflight fails, the request should not
>>>>> be sent and fail. That remains subject to compatibility risk evaluation.
>>>>>
>>>>> Cheers,
>>>>> Titouan
>>>>>
>>>>> On Wed, Apr 20, 2022 at 3:06 AM Martin H <mrtn...@gmail.com> wrote:
>>>>>
>>>>>> Hi Titouan, Blink Devs,
>>>>>>
>>>>>> Thank you for this news above.
>>>>>> I work for a software vendor affected by this change, our software
>>>>>> installs a small (https://localhost:60500) web server on a users
>>>>>> local machine and our https:// SAAS web application connects  to
>>>>>> this to hand off various features
>>>>>> We were under the impression this change was to occur in Chrome 101
>>>>>> and have been moving to that timeline rapidly but reading the above I
>>>>>> understand this has changed (confusingly though much of the documentation
>>>>>> online still carries older dates and talks about the change as early as 
>>>>>> 101
>>>>>> or 102. )
>>>>>>
>>>>>> Should I now understand that *if* this makes Chrome 102 as hoped, you
>>>>>> will have 3 mile stone releases (aka 102, 103, 104 ) with an intent to 
>>>>>> ship
>>>>>> "private network access" changes in 105?
>>>>>> I would understand it's just an estimate based on feedback around
>>>>>> this change but as it stands our business is anticipating change as early
>>>>>> as next week as this is when 101 was due to ship production.
>>>>>> it would therefore be extremely beneficial if we understand we have
>>>>>> more time to work with customers around this, we have produced updated
>>>>>> compliant local components on our end and released this in the past few
>>>>>> weeks but as you might expect we need time to address this with every
>>>>>> single one of our customers, as Chromium based browsers form the
>>>>>> overwhelming majority of users.
>>>>>>
>>>>>> Ultimately my requirement is to advise customers on the change as
>>>>>> best as possible, including how to ensure the change is not deployed as
>>>>>> some will need time to update their entire fleets.
>>>>>> When I install Chrome dev 102 build, it seems like our software still
>>>>>> works as is today. I assume as it's not on yet. Would someone be able to
>>>>>> state which flags I should enable to replicate what will happen when this
>>>>>> change goes live?
>>>>>>
>>>>>> Is it just the #block-insecure-private-network-requests
>>>>>> Do I need to
>>>>>> configure #private-network-access-send-preflights or 
>>>>>> #private-network-access-respect-preflight-results
>>>>>> Today all these settings are just "Default
>>>>>>
>>>>>> Thanks in advance, please let me know if there is a better forum for
>>>>>> this request.
>>>>>> Martin
>>>>>>
>>>>>>
>>>>>> On Wednesday, April 20, 2022 at 3:28:37 AM UTC+10 John Doe wrote:
>>>>>>
>>>>>>> Sorry seems I accidently switched the S sides in the first question,
>>>>>>> I meant from public HTTP to private HTTPS so it shouldn't be mixed 
>>>>>>> content,
>>>>>>> and in such case there's no preflight request.
>>>>>>> As I mentioned I installed chrome 98 to test it, when accessing a
>>>>>>> resource from public HTTPS to private HTTPS there's a preflight request 
>>>>>>> but
>>>>>>> no such request on an access from public HTTP to private HTTPS.
>>>>>>>
>>>>>>> On Tuesday, April 19, 2022 at 7:27:42 PM UTC+3 Titouan Rigoudy wrote:
>>>>>>>
>>>>>>>> Hi there,
>>>>>>>>
>>>>>>>> 1. Such requests are blocked by mixed content. This launch does not
>>>>>>>> change that.
>>>>>>>> 2. You will want to respond 200 OK to PNA preflight requests to
>>>>>>>> your private HTTPS server with the right headers. See the blog post 
>>>>>>>> [1] for
>>>>>>>> details.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Titouan
>>>>>>>>
>>>>>>>> [1]
>>>>>>>> https://developer.chrome.com/blog/private-network-access-preflight/#server-side-requests
>>>>>>>>
>>>>>>>> On Sun, Apr 17, 2022 at 4:56 PM John Doe <clas...@gmail.com> wrote:
>>>>>>>>
>>>>>>>>> 1. In Chrome 98, there were no preflight requests when accessing
>>>>>>>>> from public HTTPS to private HTTP, will the same be true in the final
>>>>>>>>> version?
>>>>>>>>> 2. In the case when I have a private HTTPS server that I want
>>>>>>>>> everyone to have access to (also via public HTTP), what options do I 
>>>>>>>>> have ?
>>>>>>>>>
>>>>>>>>> On Wednesday, April 6, 2022 at 8:23:58 PM UTC+3 Titouan Rigoudy
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Hi all,
>>>>>>>>>>
>>>>>>>>>> Thanks for the timely question, I was about to send an update
>>>>>>>>>> here.
>>>>>>>>>>
>>>>>>>>>> We have fixed nearly all of the blockers identified in the above
>>>>>>>>>> doc. The only outstanding issue is the aforementioned crash, which 
>>>>>>>>>> required
>>>>>>>>>> a bit more design work than the rest. That work has been completed 
>>>>>>>>>> and CLs
>>>>>>>>>> to fix the problem are now in review; they should land shortly and 
>>>>>>>>>> make it
>>>>>>>>>> in Chrome 102.
>>>>>>>>>>
>>>>>>>>>> We would like to ship again in Chrome 102 in warning-only mode,
>>>>>>>>>> just as we last tried in Chrome 98. Preflights will be sent but their
>>>>>>>>>> results will not be enforced. Failed preflights will show warnings in
>>>>>>>>>> DevTools, but requests will otherwise continue unimpeded.
>>>>>>>>>>
>>>>>>>>>> Things will stay that way for at least 3 milestones. We will
>>>>>>>>>> gather compatibility data by monitoring failed preflights, then 
>>>>>>>>>> circle back
>>>>>>>>>> here to garner approvals to turn on enforcement. That launch will be
>>>>>>>>>> accompanied by a deprecation trial for web developers to sign up for 
>>>>>>>>>> a time
>>>>>>>>>> extension if they failed to notice the warnings in time.
>>>>>>>>>>
>>>>>>>>>> Cheers,
>>>>>>>>>> Titouan
>>>>>>>>>>
>>>>>>>>>> On Wed, Apr 6, 2022 at 3:29 AM Logan Wei <shapi...@gmail.com>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> Hello,  is there now an updated timeline to roll out this
>>>>>>>>>>> change?  Will the trial restart in Chrome 102 or a later version?
>>>>>>>>>>>
>>>>>>>>>>> On Wednesday, March 2, 2022 at 6:36:21 PM UTC+8 Titouan Rigoudy
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Hi all,
>>>>>>>>>>>>
>>>>>>>>>>>> Here's the promised doc:
>>>>>>>>>>>> https://docs.google.com/document/d/1fdwetZXUz_Q03ZpGwXizq5AE1yn_lMhamUJMwvsHvTU/edit
>>>>>>>>>>>> (public, comment access for committers only)
>>>>>>>>>>>>
>>>>>>>>>>>> Cheers,
>>>>>>>>>>>> Titouan
>>>>>>>>>>>>
>>>>>>>>>>>> On Thu, Feb 17, 2022 at 3:29 PM Mike Taylor <
>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Thanks for the update Titouan. Looking forward to reading your
>>>>>>>>>>>>> doc.
>>>>>>>>>>>>>
>>>>>>>>>>>>> On 2/17/22 9:25 AM, Titouan Rigoudy wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>> Hi all,
>>>>>>>>>>>>>
>>>>>>>>>>>>> Just to let you know that due to a couple issues, chief among
>>>>>>>>>>>>> which a renderer crash (crbug.com/1279376), we are rolling
>>>>>>>>>>>>> this feature back from Chrome 98.
>>>>>>>>>>>>>
>>>>>>>>>>>>> A few issues have been identified and will block our next
>>>>>>>>>>>>> attempt at shipping this. In the meantime, we gathered some useful
>>>>>>>>>>>>> information about impact and notified developers of the upcoming 
>>>>>>>>>>>>> change.
>>>>>>>>>>>>> I'll write a doc summarizing the timeline and lessons learned, 
>>>>>>>>>>>>> then share
>>>>>>>>>>>>> as appropriate here.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 5:26 PM Chris Harrelson <
>>>>>>>>>>>>> chri...@chromium.org> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> LGTM3 for step 1.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 6:11 AM Mike Taylor <
>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> LGTM2 for step 1.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On 12/6/21 5:31 AM, Titouan Rigoudy wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> *assuming I get 2 more LGTMs, that is.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 11:31 AM Titouan Rigoudy <
>>>>>>>>>>>>>>> tit...@google.com> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Thanks! I'll come back for further discussion with UKM data
>>>>>>>>>>>>>>>> in hand.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 10:58 AM Yoav Weiss <
>>>>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> I agree UKM analysis should not block step 1, as it holds
>>>>>>>>>>>>>>>>> little risk. (There's still some risks that servers will 
>>>>>>>>>>>>>>>>> choke in the face
>>>>>>>>>>>>>>>>> of preflights, but that seems minor compared to the 
>>>>>>>>>>>>>>>>> enforcement risk)
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> Therefore,* LGTM1 for step 1* (preflights with no
>>>>>>>>>>>>>>>>> enforcement), but not further (yet). Please come back to this 
>>>>>>>>>>>>>>>>> thread with
>>>>>>>>>>>>>>>>> any data you may have as a result of adding UKMs.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Fri, Dec 3, 2021 at 6:44 PM 'Titouan Rigoudy' via
>>>>>>>>>>>>>>>>> blink-dev <blin...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Yoav, do you think UKM analysis should block sending
>>>>>>>>>>>>>>>>>> preflights without enforcing their success? I believe 
>>>>>>>>>>>>>>>>>> sending these will
>>>>>>>>>>>>>>>>>> allow us to get more precise information on the affected 
>>>>>>>>>>>>>>>>>> websites through
>>>>>>>>>>>>>>>>>> the usecounter recorded in crrev.com/c/3310846. I can
>>>>>>>>>>>>>>>>>> then analyze UKM data and use the results to inform the 
>>>>>>>>>>>>>>>>>> decision whether
>>>>>>>>>>>>>>>>>> and when to switch enforcement on?
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:19 PM Titouan Rigoudy <
>>>>>>>>>>>>>>>>>> tit...@google.com> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> I agree!
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:17 PM Mike West <
>>>>>>>>>>>>>>>>>>> mk...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> _I_ don't think we should do that, but I'd defer to
>>>>>>>>>>>>>>>>>>>> Titouan's preference. :)
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> -mike
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:14 PM Mike Taylor <
>>>>>>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Thanks - I also don't think there's a lot of value in
>>>>>>>>>>>>>>>>>>>>> this particular header being the odd-one-out, just wanted 
>>>>>>>>>>>>>>>>>>>>> to confirm we're
>>>>>>>>>>>>>>>>>>>>> not going to ship "true" first and try to change that to 
>>>>>>>>>>>>>>>>>>>>> ?1 later (which is
>>>>>>>>>>>>>>>>>>>>> always challenging).
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On 12/2/21 11:11 AM, Mike West wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> I'm not sure it makes sense to introduce a structured
>>>>>>>>>>>>>>>>>>>>> header here, given that it's layering on top of CORS 
>>>>>>>>>>>>>>>>>>>>> headers that I don't
>>>>>>>>>>>>>>>>>>>>> think there's substantial interest in changing.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> -mike
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 4:55 PM 'Titouan Rigoudy' via
>>>>>>>>>>>>>>>>>>>>> blink-dev <blin...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Hi Mike,
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> There is no support for structured headers so far,
>>>>>>>>>>>>>>>>>>>>>> for consistency reasons, and there has been no movement 
>>>>>>>>>>>>>>>>>>>>>> to deprecate the
>>>>>>>>>>>>>>>>>>>>>> "true" value for Access-Control-Allow-Credentials. The 
>>>>>>>>>>>>>>>>>>>>>> value of such a
>>>>>>>>>>>>>>>>>>>>>> deprecation seems minimal.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> I could pretty easily add support for the structured
>>>>>>>>>>>>>>>>>>>>>> "?1" value on top of the "true" token for the new
>>>>>>>>>>>>>>>>>>>>>> Access-Control-Allow-Private-Network header, and specify 
>>>>>>>>>>>>>>>>>>>>>> that, but I'm not
>>>>>>>>>>>>>>>>>>>>>> sure it would be terribly useful. Do you think otherwise?
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 4:45 PM Mike Taylor <
>>>>>>>>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Hi Titouan,
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> I'm curious what the plan is for structured headers.
>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/issues/45
>>>>>>>>>>>>>>>>>>>>>>> is marked as blocked - has there been other progress or 
>>>>>>>>>>>>>>>>>>>>>>> thinking behind the
>>>>>>>>>>>>>>>>>>>>>>> scenes?
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> thanks,
>>>>>>>>>>>>>>>>>>>>>>> Mike
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> On 11/29/21 10:36 AM, 'Titouan Rigoudy' via
>>>>>>>>>>>>>>>>>>>>>>> blink-dev wrote:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Contact emails tit...@chromium.org,
>>>>>>>>>>>>>>>>>>>>>>> va...@chromium.org, cl...@chromium.org
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Explainer
>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/blob/main/explainer.md
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Specification
>>>>>>>>>>>>>>>>>>>>>>> https://wicg.github.io/private-network-access/
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Design docs
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Sends a CORS preflight request ahead of any private
>>>>>>>>>>>>>>>>>>>>>>> network requests for subresources, asking for explicit 
>>>>>>>>>>>>>>>>>>>>>>> permission from the
>>>>>>>>>>>>>>>>>>>>>>> target server. A private network request is any request 
>>>>>>>>>>>>>>>>>>>>>>> from a public
>>>>>>>>>>>>>>>>>>>>>>> website to a private IP address or localhost, or from a 
>>>>>>>>>>>>>>>>>>>>>>> private website
>>>>>>>>>>>>>>>>>>>>>>> (e.g. intranet) to localhost. Sending a preflight 
>>>>>>>>>>>>>>>>>>>>>>> request mitigates the
>>>>>>>>>>>>>>>>>>>>>>> risk of cross-site request forgery attacks against 
>>>>>>>>>>>>>>>>>>>>>>> private network devices
>>>>>>>>>>>>>>>>>>>>>>> such as routers, which are often not prepared to defend 
>>>>>>>>>>>>>>>>>>>>>>> against this threat.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Blink component
>>>>>>>>>>>>>>>>>>>>>>> Blink>SecurityFeature>CORS>PrivateNetworkAccess
>>>>>>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS%3EPrivateNetworkAccess>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> TAG review
>>>>>>>>>>>>>>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/572
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> TAG review status Pending
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> The main interoperability risk, as always, is if
>>>>>>>>>>>>>>>>>>>>>>> other browser engines do not implement this. Compat 
>>>>>>>>>>>>>>>>>>>>>>> risk is
>>>>>>>>>>>>>>>>>>>>>>> straightforward: web servers that do not handle the new 
>>>>>>>>>>>>>>>>>>>>>>> preflight requests
>>>>>>>>>>>>>>>>>>>>>>> will eventually break, once the feature ships. The plan 
>>>>>>>>>>>>>>>>>>>>>>> to address this is
>>>>>>>>>>>>>>>>>>>>>>> as follows: 1. Send preflight request, ignore result, 
>>>>>>>>>>>>>>>>>>>>>>> always send actual
>>>>>>>>>>>>>>>>>>>>>>> request. Failed preflight requests will result in a 
>>>>>>>>>>>>>>>>>>>>>>> warning being shown in
>>>>>>>>>>>>>>>>>>>>>>> devtools. 2. Wait for 3 milestones. 3. Gate actual 
>>>>>>>>>>>>>>>>>>>>>>> request on preflight
>>>>>>>>>>>>>>>>>>>>>>> request success, with deprecation trial for developers 
>>>>>>>>>>>>>>>>>>>>>>> to buy some more
>>>>>>>>>>>>>>>>>>>>>>> time. 4. End deprecation trial 4 milestones later. 
>>>>>>>>>>>>>>>>>>>>>>> UseCounters:
>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3753
>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3755
>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3757
>>>>>>>>>>>>>>>>>>>>>>> The above measure pages that make at least one private 
>>>>>>>>>>>>>>>>>>>>>>> network request for
>>>>>>>>>>>>>>>>>>>>>>> which we would now send a preflight request.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Gecko: Worth prototyping (
>>>>>>>>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/143
>>>>>>>>>>>>>>>>>>>>>>> )
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> WebKit: No signal (
>>>>>>>>>>>>>>>>>>>>>>> https://lists.webkit.org/pipermail/webkit-dev/2021-November/032040.html)
>>>>>>>>>>>>>>>>>>>>>>> Pending response.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Web developers: No signals Anecdotal evidence so
>>>>>>>>>>>>>>>>>>>>>>> far suggests that most web developers are OK with this 
>>>>>>>>>>>>>>>>>>>>>>> new requirement,
>>>>>>>>>>>>>>>>>>>>>>> though some do not control the target endpoints and 
>>>>>>>>>>>>>>>>>>>>>>> would be negatively
>>>>>>>>>>>>>>>>>>>>>>> impacted.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Other signals:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Ergonomics
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> None.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Activation
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Gating access to the private network overnight on
>>>>>>>>>>>>>>>>>>>>>>> preflight requests would likely result in widespread 
>>>>>>>>>>>>>>>>>>>>>>> breakage. This is why
>>>>>>>>>>>>>>>>>>>>>>> the plan is to first send requests but not act on their 
>>>>>>>>>>>>>>>>>>>>>>> result, giving
>>>>>>>>>>>>>>>>>>>>>>> server developers time to implement code handling these 
>>>>>>>>>>>>>>>>>>>>>>> requests.
>>>>>>>>>>>>>>>>>>>>>>> Deprecation warnings will be surfaced in DevTools to 
>>>>>>>>>>>>>>>>>>>>>>> alert web/client
>>>>>>>>>>>>>>>>>>>>>>> developers when the potential for breakage later on is 
>>>>>>>>>>>>>>>>>>>>>>> detected.
>>>>>>>>>>>>>>>>>>>>>>> Enforcement will be turned on later (aiming for 3 
>>>>>>>>>>>>>>>>>>>>>>> milestones), along with a
>>>>>>>>>>>>>>>>>>>>>>> deprecation trial for impacted web developers to buy 
>>>>>>>>>>>>>>>>>>>>>>> themselves some more
>>>>>>>>>>>>>>>>>>>>>>> time. Experience suggests a large fraction of 
>>>>>>>>>>>>>>>>>>>>>>> developers will not notice
>>>>>>>>>>>>>>>>>>>>>>> the advance deprecation warnings until things break.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Security
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> This change aims to be security-positive, preventing
>>>>>>>>>>>>>>>>>>>>>>> CSRF attacks against soft and juicy targets such as 
>>>>>>>>>>>>>>>>>>>>>>> router admin
>>>>>>>>>>>>>>>>>>>>>>> interfaces. DNS rebinding threats were of particular 
>>>>>>>>>>>>>>>>>>>>>>> concern during the
>>>>>>>>>>>>>>>>>>>>>>> design of this feature:
>>>>>>>>>>>>>>>>>>>>>>> https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit#heading=h.189j5gnadts9
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Relevant information (client and resource IP address
>>>>>>>>>>>>>>>>>>>>>>> space) is already piped into the DevTools network 
>>>>>>>>>>>>>>>>>>>>>>> panel. Deprecation
>>>>>>>>>>>>>>>>>>>>>>> warnings and errors will be surfaced in the DevTools 
>>>>>>>>>>>>>>>>>>>>>>> issues panel
>>>>>>>>>>>>>>>>>>>>>>> explaining the problem when it arises.
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>>>>>>>>>>> ? Yes
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> DevTrial instructions
>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/blob/main/HOWTO.md
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Flag name
>>>>>>>>>>>>>>>>>>>>>>> PrivateNetworkAccessRespectPreflightResults
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Requires code in //chrome? False
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Tracking bug https://crbug.com/591068
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Launch bug https://crbug.com/1274149
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>>>>>>>>>> DevTrial on desktop 98
>>>>>>>>>>>>>>>>>>>>>>> DevTrial on android 98
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/feature/5737414355058688
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Links to previous Intent discussions Intent to
>>>>>>>>>>>>>>>>>>>>>>> prototype:
>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/PrB0xnNxaHs/m/jeoxvNjXCAAJ
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome
>>>>>>>>>>>>>>>>>>>>>>> Platform Status <https://www.chromestatus.com/>.
>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>>> You received this message because you are subscribed
>>>>>>>>>>>>>>>>>>>>>>> to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>> You received this message because you are subscribed
>>>>>>>>>>>>>>>>>>>>>> to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>> You received this message because you are subscribed to
>>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>>>>>>> from it, send an email to blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com
>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>>>> from it, send an email to blink-dev+...@chromium.org.
>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6e557fb7-5b1d-20bc-aae5-65526ca8efb7%40chromium.org
>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6e557fb7-5b1d-20bc-aae5-65526ca8efb7%40chromium.org?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9eqmxub83u9ZZiwfzdFEp0Gd3cta%2BhGXgXAWUPZtiq6Fg%40mail.gmail.com.

Reply via email to