[Removing internal-only chrome-security-owp-team list]

Sorry, one more question: the tests seem to be mostly failing on wpt.fyi
<https://wpt.fyi/results/html/anonymous-iframe?label=master&label=experimental&aligned&view=subtest&q=html%2Fanonymous-iframe>
even with --enable-experimental-web-platform-features. Do you know why that
is? What's the status of the test suite?

On Tue, Nov 1, 2022 at 11:29 AM Rick Byers <rby...@chromium.org> wrote:

> Reading through the discussion on the Mozilla standards position thread
> <https://github.com/mozilla/standards-positions/issues/628> I share the
> concern about the continued increase in complexity we're adding to the web
> platform with all these different security / isolation knobs. I will be the
> first to admit that I don't understand them all and have to keep looking up
> documentation to recover a partial understanding. But looking at the
> feedback from real users and seeing how folks are still relying on the SAB
> reverse OT
> <https://developer.chrome.com/blog/enabling-shared-array-buffer/#origin-trial>,
> I don't see any better option, and it certainly seems the team here has
> done their homework and is investing seriously in pragmatic measures to
> ease adoption of origin-level isolation (which is pretty clearly the right
> long-term architecture for the web). As is so often the case on the web, I
> think we have to take a step to the adjacent pragmatic option and trust
> that it'll lead to opportunities to simplify in the future as the ecosystem
> slowly updates. Also, since this feature is built on top of existing
> storage isolation primitives and is most useful for a small number of
> special cases like ad networks, it doesn't seem to me like it adds that
> much new complexity to the platform architecture.
>
> I assume that at least one of the major customers (eg. Zoom, Google
> Display Ads, StackBlitz) has tried the OT and is satisfied with it's
> behavior and so is prepared to ramp up wide scale usage, is that right?
> Assuming so, then I think the benefit to shipping now outweighs the
> remaining interop risk and I trust the team to continue iterating in good
> faith in the standards community. LGTM1 to ship.
>
> Rick
>
>
> On Fri, Oct 28, 2022 at 4:20 PM 'Arthur Sonzogni' via blink-dev <
> blink-dev@chromium.org> wrote:
>
>> Contact emails
>>
>> arthursonzo...@chromium.org, cl...@chromium.org
>>
>> Explainer
>>
>> https://github.com/WICG/anonymous-iframe
>>
>> Specification
>>
>> https://wicg.github.io/anonymous-iframe/#specification
>>
>> Design docs
>>
>>
>> https://docs.google.com/document/d/1poI75BaQ9aqcMGJn_K01-QHsQQbEOwRWvg3Af4VWTmY/edit
>>
>> Summary
>>
>> Anonymous iframes give developers a way to load documents in third party
>> iframes using new and ephemeral contexts.
>>
>> Anonymous iframes are a generalization of COEP credentialless to support
>> 3rd party iframes that may not deploy COEP. Like with COEP credentialless,
>> we replace the opt-in of cross-origin subresources by avoiding to load
>> non-public resources. This will remove the constraint that 3rd party
>> iframes must support COEP in order to be embedded in a COEP page and
>> unblock developers looking to adopt cross-origin-isolation.
>>
>> This way, developers using COEP can now embed third party iframes that do
>> not.
>>
>> Blink component
>>
>> Blink>SecurityFeature
>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature>
>>
>>
>> Search tags
>>
>> coep <https://chromestatus.com/features#tags:coep>,
>> cross-origin-embedder-policy
>> <https://chromestatus.com/features#tags:cross-origin-embedder-policy>,
>> iframe <https://chromestatus.com/features#tags:iframe>, anonymous
>> <https://chromestatus.com/features#tags:anonymous>
>>
>> TAG review
>>
>> https://github.com/w3ctag/design-reviews/issues/639
>>
>> TAG review status
>>
>> Issues addressed
>>
>> Link to origin trial feedback summary
>>
>>
>> https://docs.google.com/document/d/1WzOrxIQnq9sTFkou9P8GshrQSeyO3MBdSvYqJjP410Q
>> <https://docs.google.com/document/d/1WzOrxIQnq9sTFkou9P8GshrQSeyO3MBdSvYqJjP410Q/edit>
>>
>> Risks
>>
>> Interoperability and Compatibility
>>
>> The main risk is that anonymous iframes fail to become an interoperable
>> part of the web platform if other browsers do not implement the API.
>>
>>
>> Gecko: No signal (
>> https://github.com/mozilla/standards-positions/issues/628)
>>
>> They do like the concept of credentialless/anonymous iframes.
>>
>> However they are suggesting alternative ways of activating the feature.
>> Instead of the `anonymous` attribute, it could potentially be split into 3
>> new sandbox flags for instance. One about allowing only partitioned
>> storage, one about allowing only no-opener popups, and one about disabling
>> autofill. It is not clear exactly how it would behave with regards to
>> sandbox inheritance, whether it would be understandable to developers, or
>> if introducing a precedent with `disallow-XXX` kind of flag as opposed to
>> `allow-XXX` would be problematic.
>>
>> WebKit: No signal (
>> https://lists.webkit.org/pipermail/webkit-dev/2022-April/032205.html)
>>
>> Second request on Github:
>> https://github.com/WebKit/standards-positions/issues/45
>>
>> Web developers: Positive (https://github.com/WICG/proposals/issues/53)
>> Zoom, Google Display Ads, StackBlitz are supportive. Several other
>> developers also expressed their need to get anonymous iframes to embed 3rd
>> party iframes inside crossOriginIsolated contexts.
>>
>> Other signals: N/A
>>
>> Ergonomics
>>
>> None.
>>
>> Activation
>>
>> A blog post explains how to use the feature:
>>
>>
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/-7H19EHTenU/m/oWfFm21eAAAJ
>>
>> We don't expect developers having difficulties using it as-is. It only
>> requires adding the "anonymous" attribute to <iframe>.
>>
>>
>> Security
>>
>> See the threat model doc:
>>
>> https://wicg.github.io/anonymous-iframe/#security
>>
>> http://go/anonymous-iframe-threat-model
>>
>>
>> WebView application risks
>>
>> Does this intent deprecate or change behavior of existing APIs, such that
>> it has potentially high risk for Android WebView-based applications?
>>
>> No risks identified. This is platform independent. WebView is not
>> different.
>>
>>
>> Debuggability
>>
>> Anonymous iframes are designed to avoid breaking iframes. It does not
>> introduce new kinds of failures.
>>
>> In the devtool panel, when an iframe is blocked by COEP, Anonymous
>> iframes will be suggested as a potential solution.
>>
>> The JS API: `window.anonymouslyFramed` already reflects whether a
>> document is embedded inside an anonymous iframe or not. This is not
>> reflected in devtool yet, but it could be in the future, if we believe this
>> is worth it.
>>
>> Will this feature be supported on all six Blink platforms (Windows, Mac,
>> Linux, Chrome OS, Android, and Android WebView)?
>>
>> Yes
>>
>> This is a web platform feature. Consistent behavior among all the
>> platforms is important.
>>
>> Weblayer is not supported, because disabling autofill hasn't been
>> implemented.
>>
>>
>> Is this feature fully tested by web-platform-tests
>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>> ?
>>
>> Yes
>>
>> DevTrial instructions
>>
>> https://anonymous-iframe.glitch.me
>>
>> Flag name
>>
>> --enable-blink-features=AnonymousIframe
>>
>> Requires code in //chrome?
>>
>> False
>>
>> Tracking bug
>>
>> https://bugs.chromium.org/p/chromium/issues/detail?id=1211800
>>
>> Launch bug
>>
>> https://bugs.chromium.org/p/chromium/issues/detail?id=1342928
>>
>> Measurement
>>
>> WebFeature::kAnonymousIframe
>> https://chromestatus.com/metrics/feature/timeline/popularity/4219
>>
>> Non-OSS dependencies
>>
>> No dependencies.
>>
>> Sample links
>>
>> https://anonymous-iframe.glitch.me
>>
>> Estimated milestones
>>
>>
>> Chrome for desktop 109
>>
>> OriginTrial desktop last 108
>>
>> OriginTrial desktop first 106
>>
>> DevTrial on desktop 105
>>
>>
>> Chrome for Android 109
>>
>> OriginTrial Android last 108
>>
>> OriginTrial Android first 106
>>
>> DevTrial on Android 105
>>
>>
>> Android Webview 109
>>
>> OriginTrial webView last 108
>>
>> OriginTrial webView first 106
>>
>>
>> Anticipated spec changes
>>
>> Open questions about a feature may be a source of future web compat or
>> interop issues. Please list open issues (e.g. links to known github issues
>> in the project for the feature specification) whose resolution may
>> introduce web compat/interop risk (e.g., changing to naming or structure of
>> the API in a non-backward-compatible way).
>>
>> N/A
>>
>> Link to entry on the Chrome Platform Status
>>
>> https://chromestatus.com/feature/5729461725036544
>>
>> Links to previous Intent discussions
>>
>> Intent to prototype:
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/CjrLTguZuO4
>>
>> Intent to Experiment:
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/-7H19EHTenU/m/oWfFm21eAAAJ
>>
>> Intent to Extend Experiment:
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/-7H19EHTenU/m/oWfFm21eAAAJ
>>
>>
>> This intent message was generated by Chrome Platform Status
>> <https://chromestatus.com/>.
>>
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAzos5HJbyTDnkf8nu89Q0fnt2E4%3DPNHSen84oxb1UbYdX882w%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAzos5HJbyTDnkf8nu89Q0fnt2E4%3DPNHSen84oxb1UbYdX882w%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY_tzxVa3J9Q-qL94O1O_x-%3DSRUqsFQ-ddv0ksagtcsUAw%40mail.gmail.com.

Reply via email to