Hi blink-dev,

Just wanted to state here that we'll send a different intent to ship when
we want to enforce that preflights succeed, instead of re-using this one
(there is already an intent to deprecate thread [1]). PNA has been
launching bit by bit to manage compatibility risk, and having a
chromestatus entry / intents for each stage separately will help clarify
the current status.

I've updated the associated chromestatus feature [2] to focus on
warning-only preflights, as well.

Cheers,
Titouan

[1]
https://groups.google.com/a/chromium.org/g/blink-dev/c/FlenxUPCDec/m/T2YBn0kEBQAJ
[2] https://chromestatus.com/feature/5737414355058688

On Fri, Oct 28, 2022 at 1:52 PM José Luis Campanello <
jose.luis.campane...@gmail.com> wrote:

> Thanks for the response!!! Have a nice weekend!
>
> On Friday, October 28, 2022 at 7:25:20 AM UTC-3 Titouan Rigoudy wrote:
>
>> Meant to link to this other thread [1] as the one on which we need 3
>> LGTMs.
>>
>> Cheers,
>> Titouan
>>
>> [1]
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/FlenxUPCDec/m/T2YBn0kEBQAJ
>>
>> On Fri, Oct 28, 2022 at 6:22 AM Titouan Rigoudy <tit...@google.com>
>> wrote:
>>
>>> [blink-dev to bcc]
>>>
>>> Hi José,
>>>
>>> Thanks for reaching out, and sorry for the confusion!
>>>
>>> To be clear, the blog post states that this would be enabled in 107 *at
>>> the earliest*, which reflected our best estimate back when we wrote the
>>> post.
>>>
>>> We are now aiming to ship and start a deprecation trial in 109 at the
>>> earliest, if this thread gets 3 LGTMs by the end of next week. You can stay
>>> tuned here to know when this will ship, or follow along on Chromestatus
>>> [1]. The deprecation trial would allow you to request an extension until
>>> 113.
>>>
>>> Happy to answer any other questions you may have!
>>>
>>> Cheers,
>>> Titouan
>>>
>>> [1] https://chromestatus.com/feature/5737414355058688
>>>
>>> On Mon, Oct 24, 2022 at 3:31 PM José Luis Campanello <
>>> jose.luis....@gmail.com> wrote:
>>>
>>>> Hi all,
>>>>
>>>> i've been working to fix an application that will be affected by PNA
>>>> preflights (we have an application that talks to a private server and a
>>>> local -127.0.0.1- server).
>>>>
>>>> As I understood from this blog post (
>>>> https://developer.chrome.com/blog/private-network-access-preflight/#rollout-plan),
>>>> it seems PNA preflights will be enabled starting with release 107, but i
>>>> can't find any reference as to whether it is being actually released in 107
>>>> or later (I've seen 109, 112 and shipping on 113). I think I'm probably not
>>>> understanding correctly all the details of what I'm reading.
>>>>
>>>> Can you confirm when this feature will enabled in the standard chrome?
>>>>
>>>>
>>>> On Monday, May 30, 2022 at 6:12:42 AM UTC-3 Titouan Rigoudy wrote:
>>>>
>>>>> Hi there,
>>>>>
>>>>> Thanks for reaching out.
>>>>>
>>>>> Andrew: Indeed, this was crbug.com/1329248, apologies for the
>>>>> oversight. The change has been rolled back on Friday. Chrome 102 should
>>>>> pick up the configuration change upon restart.
>>>>>
>>>>> cpmtatest: by default, script fetches are made in no-cors mode with
>>>>> credentials. I believe [1] and [2] are the relevant specification bits
>>>>> here. If you think this should not be how PNA works, please file an issue
>>>>> in the GitHub repo [3].
>>>>>
>>>>> Cheers,
>>>>> Titouan
>>>>>
>>>>> [1]
>>>>> https://html.spec.whatwg.org/multipage/urls-and-fetching.html#create-a-potential-cors-request
>>>>> [2]
>>>>> https://html.spec.whatwg.org/multipage/webappapis.html#fetch-a-classic-script
>>>>> [3] https://github.com/WICG/private-network-access/issues
>>>>>
>>>>> On Mon, May 30, 2022 at 10:46 AM Who Cares <cpmt...@gmail.com> wrote:
>>>>>
>>>>>> Hi,
>>>>>> Now when chrome 102 is out I wanted to test it so I ran it with
>>>>>> *--enable-features=PrivateNetworkAccessRespectPreflightResults*
>>>>>> There's one thing I'm trying to understand,
>>>>>> I have an HTML page with a script tag, the src of this tag points to
>>>>>> a more private network, the default behavior of script tags is not to
>>>>>> trigger CORS and since v102 they do trigger it which is expected.
>>>>>> My question is:
>>>>>> I'm getting this error: *"Response to preflight request doesn't pass
>>>>>> access control check: The value of the 'Access-Control-Allow-Credentials'
>>>>>> header in the response is '' which must be 'true' when the request's
>>>>>> credentials mode is 'include'."*
>>>>>> I never asked to send credentials in my script tag, I guess I can
>>>>>> force not send it by adding *crossorigin="" *to the tag but
>>>>>> shouldn't the default behavior be not to send it with credentials?
>>>>>>
>>>>> On Saturday, May 28, 2022 at 12:47:02 AM UTC+3 Andrew Boeger wrote:
>>>>>>
>>>>>>> Hi all -
>>>>>>>
>>>>>>> Just want to call out that this assumption...
>>>>>>> Chrome 102 should also not break anything, since we are sending
>>>>>>> preflights in warning-only mode. If the preflight fails, a warning is
>>>>>>> displayed in DevTools but the request proceeds as before
>>>>>>> ... turned out to be false.
>>>>>>>
>>>>>>> The change recently deployed DOES break things. It has broken our
>>>>>>> internal admin tool our CS teams use to manage customer accounts.
>>>>>>>
>>>>>>> Bug opened here >
>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1329248
>>>>>>>
>>>>>>> In meantime, I have my users moving to other browsers because this
>>>>>>> has broken a critical function for them.
>>>>>>>
>>>>>>> On Wednesday, April 20, 2022 at 3:47:36 AM UTC-5 Titouan Rigoudy
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Hi there,
>>>>>>>>
>>>>>>>> John: that's due to another facet of Private Network Access (not
>>>>>>>> this intent) that started a deprecation trial in Chrome 94. See
>>>>>>>> https://chromestatus.com/feature/5436853517811712. Unless signed
>>>>>>>> up for the deprecation trial, HTTP websites are no longer allowed to 
>>>>>>>> make
>>>>>>>> any requests to private servers.
>>>>>>>>
>>>>>>>> Martin: there will be no breaking change in Chrome 101. I need to
>>>>>>>> update the blog post to make the new timeline clearer.
>>>>>>>>
>>>>>>>> Chrome 102 should also not break anything, since we are sending
>>>>>>>> preflights in warning-only mode. If the preflight fails, a warning is
>>>>>>>> displayed in DevTools but the request proceeds as before. As explained
>>>>>>>> above, this will remain the case until at least Chrome 105, at which 
>>>>>>>> point
>>>>>>>> we may turn on enforcement: when a preflight fails, the request should 
>>>>>>>> not
>>>>>>>> be sent and fail. That remains subject to compatibility risk 
>>>>>>>> evaluation.
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>> Titouan
>>>>>>>>
>>>>>>>> On Wed, Apr 20, 2022 at 3:06 AM Martin H <mrtn...@gmail.com> wrote:
>>>>>>>>
>>>>>>>>> Hi Titouan, Blink Devs,
>>>>>>>>>
>>>>>>>>> Thank you for this news above.
>>>>>>>>> I work for a software vendor affected by this change, our software
>>>>>>>>> installs a small (https://localhost:60500) web server on a users
>>>>>>>>> local machine and our https:// SAAS web application connects  to
>>>>>>>>> this to hand off various features
>>>>>>>>> We were under the impression this change was to occur in Chrome
>>>>>>>>> 101 and have been moving to that timeline rapidly but reading the 
>>>>>>>>> above I
>>>>>>>>> understand this has changed (confusingly though much of the 
>>>>>>>>> documentation
>>>>>>>>> online still carries older dates and talks about the change as early 
>>>>>>>>> as 101
>>>>>>>>> or 102. )
>>>>>>>>>
>>>>>>>>> Should I now understand that *if* this makes Chrome 102 as hoped,
>>>>>>>>> you will have 3 mile stone releases (aka 102, 103, 104 ) with an 
>>>>>>>>> intent to
>>>>>>>>> ship "private network access" changes in 105?
>>>>>>>>> I would understand it's just an estimate based on feedback around
>>>>>>>>> this change but as it stands our business is anticipating change as 
>>>>>>>>> early
>>>>>>>>> as next week as this is when 101 was due to ship production.
>>>>>>>>> it would therefore be extremely beneficial if we understand we
>>>>>>>>> have more time to work with customers around this, we have produced 
>>>>>>>>> updated
>>>>>>>>> compliant local components on our end and released this in the past 
>>>>>>>>> few
>>>>>>>>> weeks but as you might expect we need time to address this with every
>>>>>>>>> single one of our customers, as Chromium based browsers form the
>>>>>>>>> overwhelming majority of users.
>>>>>>>>>
>>>>>>>>> Ultimately my requirement is to advise customers on the change as
>>>>>>>>> best as possible, including how to ensure the change is not deployed 
>>>>>>>>> as
>>>>>>>>> some will need time to update their entire fleets.
>>>>>>>>> When I install Chrome dev 102 build, it seems like our software
>>>>>>>>> still works as is today. I assume as it's not on yet. Would someone 
>>>>>>>>> be able
>>>>>>>>> to state which flags I should enable to replicate what will happen 
>>>>>>>>> when
>>>>>>>>> this change goes live?
>>>>>>>>>
>>>>>>>>> Is it just the #block-insecure-private-network-requests
>>>>>>>>> Do I need to
>>>>>>>>> configure #private-network-access-send-preflights or 
>>>>>>>>> #private-network-access-respect-preflight-results
>>>>>>>>> Today all these settings are just "Default
>>>>>>>>>
>>>>>>>>> Thanks in advance, please let me know if there is a better forum
>>>>>>>>> for this request.
>>>>>>>>> Martin
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> On Wednesday, April 20, 2022 at 3:28:37 AM UTC+10 John Doe wrote:
>>>>>>>>>
>>>>>>>>>> Sorry seems I accidently switched the S sides in the first
>>>>>>>>>> question, I meant from public HTTP to private HTTPS so it shouldn't 
>>>>>>>>>> be
>>>>>>>>>> mixed content, and in such case there's no preflight request.
>>>>>>>>>> As I mentioned I installed chrome 98 to test it, when accessing a
>>>>>>>>>> resource from public HTTPS to private HTTPS there's a preflight 
>>>>>>>>>> request but
>>>>>>>>>> no such request on an access from public HTTP to private HTTPS.
>>>>>>>>>>
>>>>>>>>>> On Tuesday, April 19, 2022 at 7:27:42 PM UTC+3 Titouan Rigoudy
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> Hi there,
>>>>>>>>>>>
>>>>>>>>>>> 1. Such requests are blocked by mixed content. This launch does
>>>>>>>>>>> not change that.
>>>>>>>>>>> 2. You will want to respond 200 OK to PNA preflight requests to
>>>>>>>>>>> your private HTTPS server with the right headers. See the blog post 
>>>>>>>>>>> [1] for
>>>>>>>>>>> details.
>>>>>>>>>>>
>>>>>>>>>>> Cheers,
>>>>>>>>>>> Titouan
>>>>>>>>>>>
>>>>>>>>>>> [1]
>>>>>>>>>>> https://developer.chrome.com/blog/private-network-access-preflight/#server-side-requests
>>>>>>>>>>>
>>>>>>>>>>> On Sun, Apr 17, 2022 at 4:56 PM John Doe <clas...@gmail.com>
>>>>>>>>>>> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> 1. In Chrome 98, there were no preflight requests when
>>>>>>>>>>>> accessing from public HTTPS to private HTTP, will the same be true 
>>>>>>>>>>>> in the
>>>>>>>>>>>> final version?
>>>>>>>>>>>> 2. In the case when I have a private HTTPS server that I want
>>>>>>>>>>>> everyone to have access to (also via public HTTP), what options do 
>>>>>>>>>>>> I have ?
>>>>>>>>>>>>
>>>>>>>>>>>> On Wednesday, April 6, 2022 at 8:23:58 PM UTC+3 Titouan Rigoudy
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Hi all,
>>>>>>>>>>>>>
>>>>>>>>>>>>> Thanks for the timely question, I was about to send an update
>>>>>>>>>>>>> here.
>>>>>>>>>>>>>
>>>>>>>>>>>>> We have fixed nearly all of the blockers identified in the
>>>>>>>>>>>>> above doc. The only outstanding issue is the aforementioned 
>>>>>>>>>>>>> crash, which
>>>>>>>>>>>>> required a bit more design work than the rest. That work has been 
>>>>>>>>>>>>> completed
>>>>>>>>>>>>> and CLs to fix the problem are now in review; they should land 
>>>>>>>>>>>>> shortly and
>>>>>>>>>>>>> make it in Chrome 102.
>>>>>>>>>>>>>
>>>>>>>>>>>>> We would like to ship again in Chrome 102 in warning-only
>>>>>>>>>>>>> mode, just as we last tried in Chrome 98. Preflights will be sent 
>>>>>>>>>>>>> but their
>>>>>>>>>>>>> results will not be enforced. Failed preflights will show 
>>>>>>>>>>>>> warnings in
>>>>>>>>>>>>> DevTools, but requests will otherwise continue unimpeded.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Things will stay that way for at least 3 milestones. We will
>>>>>>>>>>>>> gather compatibility data by monitoring failed preflights, then 
>>>>>>>>>>>>> circle back
>>>>>>>>>>>>> here to garner approvals to turn on enforcement. That launch will 
>>>>>>>>>>>>> be
>>>>>>>>>>>>> accompanied by a deprecation trial for web developers to sign up 
>>>>>>>>>>>>> for a time
>>>>>>>>>>>>> extension if they failed to notice the warnings in time.
>>>>>>>>>>>>>
>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Wed, Apr 6, 2022 at 3:29 AM Logan Wei <shapi...@gmail.com>
>>>>>>>>>>>>> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> Hello,  is there now an updated timeline to roll out this
>>>>>>>>>>>>>> change?  Will the trial restart in Chrome 102 or a later version?
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Wednesday, March 2, 2022 at 6:36:21 PM UTC+8 Titouan
>>>>>>>>>>>>>> Rigoudy wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Hi all,
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Here's the promised doc:
>>>>>>>>>>>>>>> https://docs.google.com/document/d/1fdwetZXUz_Q03ZpGwXizq5AE1yn_lMhamUJMwvsHvTU/edit
>>>>>>>>>>>>>>> (public, comment access for committers only)
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Thu, Feb 17, 2022 at 3:29 PM Mike Taylor <
>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Thanks for the update Titouan. Looking forward to reading
>>>>>>>>>>>>>>>> your doc.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On 2/17/22 9:25 AM, Titouan Rigoudy wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Hi all,
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Just to let you know that due to a couple issues, chief
>>>>>>>>>>>>>>>> among which a renderer crash (crbug.com/1279376), we are
>>>>>>>>>>>>>>>> rolling this feature back from Chrome 98.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> A few issues have been identified and will block our next
>>>>>>>>>>>>>>>> attempt at shipping this. In the meantime, we gathered some 
>>>>>>>>>>>>>>>> useful
>>>>>>>>>>>>>>>> information about impact and notified developers of the 
>>>>>>>>>>>>>>>> upcoming change.
>>>>>>>>>>>>>>>> I'll write a doc summarizing the timeline and lessons learned, 
>>>>>>>>>>>>>>>> then share
>>>>>>>>>>>>>>>> as appropriate here.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 5:26 PM Chris Harrelson <
>>>>>>>>>>>>>>>> chri...@chromium.org> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> LGTM3 for step 1.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 6:11 AM Mike Taylor <
>>>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> LGTM2 for step 1.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On 12/6/21 5:31 AM, Titouan Rigoudy wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> *assuming I get 2 more LGTMs, that is.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 11:31 AM Titouan Rigoudy <
>>>>>>>>>>>>>>>>>> tit...@google.com> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Thanks! I'll come back for further discussion with UKM
>>>>>>>>>>>>>>>>>>> data in hand.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Mon, Dec 6, 2021 at 10:58 AM Yoav Weiss <
>>>>>>>>>>>>>>>>>>> yoav...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> I agree UKM analysis should not block step 1, as it
>>>>>>>>>>>>>>>>>>>> holds little risk. (There's still some risks that servers 
>>>>>>>>>>>>>>>>>>>> will choke in the
>>>>>>>>>>>>>>>>>>>> face of preflights, but that seems minor compared to the 
>>>>>>>>>>>>>>>>>>>> enforcement risk)
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Therefore,* LGTM1 for step 1* (preflights with no
>>>>>>>>>>>>>>>>>>>> enforcement), but not further (yet). Please come back to 
>>>>>>>>>>>>>>>>>>>> this thread with
>>>>>>>>>>>>>>>>>>>> any data you may have as a result of adding UKMs.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Fri, Dec 3, 2021 at 6:44 PM 'Titouan Rigoudy' via
>>>>>>>>>>>>>>>>>>>> blink-dev <blin...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Yoav, do you think UKM analysis should block sending
>>>>>>>>>>>>>>>>>>>>> preflights without enforcing their success? I believe 
>>>>>>>>>>>>>>>>>>>>> sending these will
>>>>>>>>>>>>>>>>>>>>> allow us to get more precise information on the affected 
>>>>>>>>>>>>>>>>>>>>> websites through
>>>>>>>>>>>>>>>>>>>>> the usecounter recorded in crrev.com/c/3310846. I can
>>>>>>>>>>>>>>>>>>>>> then analyze UKM data and use the results to inform the 
>>>>>>>>>>>>>>>>>>>>> decision whether
>>>>>>>>>>>>>>>>>>>>> and when to switch enforcement on?
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:19 PM Titouan Rigoudy <
>>>>>>>>>>>>>>>>>>>>> tit...@google.com> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> I agree!
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:17 PM Mike West <
>>>>>>>>>>>>>>>>>>>>>> mk...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> _I_ don't think we should do that, but I'd defer to
>>>>>>>>>>>>>>>>>>>>>>> Titouan's preference. :)
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> -mike
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 5:14 PM Mike Taylor <
>>>>>>>>>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Thanks - I also don't think there's a lot of value
>>>>>>>>>>>>>>>>>>>>>>>> in this particular header being the odd-one-out, just 
>>>>>>>>>>>>>>>>>>>>>>>> wanted to confirm
>>>>>>>>>>>>>>>>>>>>>>>> we're not going to ship "true" first and try to change 
>>>>>>>>>>>>>>>>>>>>>>>> that to ?1 later
>>>>>>>>>>>>>>>>>>>>>>>> (which is always challenging).
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> On 12/2/21 11:11 AM, Mike West wrote:
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> I'm not sure it makes sense to introduce a
>>>>>>>>>>>>>>>>>>>>>>>> structured header here, given that it's layering on 
>>>>>>>>>>>>>>>>>>>>>>>> top of CORS headers
>>>>>>>>>>>>>>>>>>>>>>>> that I don't think there's substantial interest in 
>>>>>>>>>>>>>>>>>>>>>>>> changing.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> -mike
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 4:55 PM 'Titouan Rigoudy'
>>>>>>>>>>>>>>>>>>>>>>>> via blink-dev <blin...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>> Hi Mike,
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>> There is no support for structured headers so far,
>>>>>>>>>>>>>>>>>>>>>>>>> for consistency reasons, and there has been no 
>>>>>>>>>>>>>>>>>>>>>>>>> movement to deprecate the
>>>>>>>>>>>>>>>>>>>>>>>>> "true" value for Access-Control-Allow-Credentials. 
>>>>>>>>>>>>>>>>>>>>>>>>> The value of such a
>>>>>>>>>>>>>>>>>>>>>>>>> deprecation seems minimal.
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>> I could pretty easily add support for the
>>>>>>>>>>>>>>>>>>>>>>>>> structured "?1" value on top of the "true" token for 
>>>>>>>>>>>>>>>>>>>>>>>>> the new
>>>>>>>>>>>>>>>>>>>>>>>>> Access-Control-Allow-Private-Network header, and 
>>>>>>>>>>>>>>>>>>>>>>>>> specify that, but I'm not
>>>>>>>>>>>>>>>>>>>>>>>>> sure it would be terribly useful. Do you think 
>>>>>>>>>>>>>>>>>>>>>>>>> otherwise?
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>> Cheers,
>>>>>>>>>>>>>>>>>>>>>>>>> Titouan
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>> On Thu, Dec 2, 2021 at 4:45 PM Mike Taylor <
>>>>>>>>>>>>>>>>>>>>>>>>> mike...@chromium.org> wrote:
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Hi Titouan,
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> I'm curious what the plan is for structured
>>>>>>>>>>>>>>>>>>>>>>>>>> headers.
>>>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/issues/45
>>>>>>>>>>>>>>>>>>>>>>>>>> is marked as blocked - has there been other progress 
>>>>>>>>>>>>>>>>>>>>>>>>>> or thinking behind the
>>>>>>>>>>>>>>>>>>>>>>>>>> scenes?
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> thanks,
>>>>>>>>>>>>>>>>>>>>>>>>>> Mike
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> On 11/29/21 10:36 AM, 'Titouan Rigoudy' via
>>>>>>>>>>>>>>>>>>>>>>>>>> blink-dev wrote:
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Contact emails tit...@chromium.org,
>>>>>>>>>>>>>>>>>>>>>>>>>> va...@chromium.org, cl...@chromium.org
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Explainer
>>>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/blob/main/explainer.md
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Specification
>>>>>>>>>>>>>>>>>>>>>>>>>> https://wicg.github.io/private-network-access/
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Design docs
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Sends a CORS preflight request ahead of any
>>>>>>>>>>>>>>>>>>>>>>>>>> private network requests for subresources, asking 
>>>>>>>>>>>>>>>>>>>>>>>>>> for explicit permission
>>>>>>>>>>>>>>>>>>>>>>>>>> from the target server. A private network request is 
>>>>>>>>>>>>>>>>>>>>>>>>>> any request from a
>>>>>>>>>>>>>>>>>>>>>>>>>> public website to a private IP address or localhost, 
>>>>>>>>>>>>>>>>>>>>>>>>>> or from a private
>>>>>>>>>>>>>>>>>>>>>>>>>> website (e.g. intranet) to localhost. Sending a 
>>>>>>>>>>>>>>>>>>>>>>>>>> preflight request mitigates
>>>>>>>>>>>>>>>>>>>>>>>>>> the risk of cross-site request forgery attacks 
>>>>>>>>>>>>>>>>>>>>>>>>>> against private network
>>>>>>>>>>>>>>>>>>>>>>>>>> devices such as routers, which are often not 
>>>>>>>>>>>>>>>>>>>>>>>>>> prepared to defend against
>>>>>>>>>>>>>>>>>>>>>>>>>> this threat.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Blink component
>>>>>>>>>>>>>>>>>>>>>>>>>> Blink>SecurityFeature>CORS>PrivateNetworkAccess
>>>>>>>>>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS%3EPrivateNetworkAccess>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> TAG review
>>>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/572
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> TAG review status Pending
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> The main interoperability risk, as always, is if
>>>>>>>>>>>>>>>>>>>>>>>>>> other browser engines do not implement this. Compat 
>>>>>>>>>>>>>>>>>>>>>>>>>> risk is
>>>>>>>>>>>>>>>>>>>>>>>>>> straightforward: web servers that do not handle the 
>>>>>>>>>>>>>>>>>>>>>>>>>> new preflight requests
>>>>>>>>>>>>>>>>>>>>>>>>>> will eventually break, once the feature ships. The 
>>>>>>>>>>>>>>>>>>>>>>>>>> plan to address this is
>>>>>>>>>>>>>>>>>>>>>>>>>> as follows: 1. Send preflight request, ignore 
>>>>>>>>>>>>>>>>>>>>>>>>>> result, always send actual
>>>>>>>>>>>>>>>>>>>>>>>>>> request. Failed preflight requests will result in a 
>>>>>>>>>>>>>>>>>>>>>>>>>> warning being shown in
>>>>>>>>>>>>>>>>>>>>>>>>>> devtools. 2. Wait for 3 milestones. 3. Gate actual 
>>>>>>>>>>>>>>>>>>>>>>>>>> request on preflight
>>>>>>>>>>>>>>>>>>>>>>>>>> request success, with deprecation trial for 
>>>>>>>>>>>>>>>>>>>>>>>>>> developers to buy some more
>>>>>>>>>>>>>>>>>>>>>>>>>> time. 4. End deprecation trial 4 milestones later. 
>>>>>>>>>>>>>>>>>>>>>>>>>> UseCounters:
>>>>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3753
>>>>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3755
>>>>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/metrics/feature/timeline/popularity/3757
>>>>>>>>>>>>>>>>>>>>>>>>>> The above measure pages that make at least one 
>>>>>>>>>>>>>>>>>>>>>>>>>> private network request for
>>>>>>>>>>>>>>>>>>>>>>>>>> which we would now send a preflight request.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Gecko: Worth prototyping (
>>>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/143
>>>>>>>>>>>>>>>>>>>>>>>>>> )
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> WebKit: No signal (
>>>>>>>>>>>>>>>>>>>>>>>>>> https://lists.webkit.org/pipermail/webkit-dev/2021-November/032040.html)
>>>>>>>>>>>>>>>>>>>>>>>>>> Pending response.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Web developers: No signals Anecdotal evidence so
>>>>>>>>>>>>>>>>>>>>>>>>>> far suggests that most web developers are OK with 
>>>>>>>>>>>>>>>>>>>>>>>>>> this new requirement,
>>>>>>>>>>>>>>>>>>>>>>>>>> though some do not control the target endpoints and 
>>>>>>>>>>>>>>>>>>>>>>>>>> would be negatively
>>>>>>>>>>>>>>>>>>>>>>>>>> impacted.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Other signals:
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Ergonomics
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> None.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Activation
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Gating access to the private network overnight on
>>>>>>>>>>>>>>>>>>>>>>>>>> preflight requests would likely result in widespread 
>>>>>>>>>>>>>>>>>>>>>>>>>> breakage. This is why
>>>>>>>>>>>>>>>>>>>>>>>>>> the plan is to first send requests but not act on 
>>>>>>>>>>>>>>>>>>>>>>>>>> their result, giving
>>>>>>>>>>>>>>>>>>>>>>>>>> server developers time to implement code handling 
>>>>>>>>>>>>>>>>>>>>>>>>>> these requests.
>>>>>>>>>>>>>>>>>>>>>>>>>> Deprecation warnings will be surfaced in DevTools to 
>>>>>>>>>>>>>>>>>>>>>>>>>> alert web/client
>>>>>>>>>>>>>>>>>>>>>>>>>> developers when the potential for breakage later on 
>>>>>>>>>>>>>>>>>>>>>>>>>> is detected.
>>>>>>>>>>>>>>>>>>>>>>>>>> Enforcement will be turned on later (aiming for 3 
>>>>>>>>>>>>>>>>>>>>>>>>>> milestones), along with a
>>>>>>>>>>>>>>>>>>>>>>>>>> deprecation trial for impacted web developers to buy 
>>>>>>>>>>>>>>>>>>>>>>>>>> themselves some more
>>>>>>>>>>>>>>>>>>>>>>>>>> time. Experience suggests a large fraction of 
>>>>>>>>>>>>>>>>>>>>>>>>>> developers will not notice
>>>>>>>>>>>>>>>>>>>>>>>>>> the advance deprecation warnings until things break.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Security
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> This change aims to be security-positive,
>>>>>>>>>>>>>>>>>>>>>>>>>> preventing CSRF attacks against soft and juicy 
>>>>>>>>>>>>>>>>>>>>>>>>>> targets such as router admin
>>>>>>>>>>>>>>>>>>>>>>>>>> interfaces. DNS rebinding threats were of particular 
>>>>>>>>>>>>>>>>>>>>>>>>>> concern during the
>>>>>>>>>>>>>>>>>>>>>>>>>> design of this feature:
>>>>>>>>>>>>>>>>>>>>>>>>>> https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit#heading=h.189j5gnadts9
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Relevant information (client and resource IP
>>>>>>>>>>>>>>>>>>>>>>>>>> address space) is already piped into the DevTools 
>>>>>>>>>>>>>>>>>>>>>>>>>> network panel.
>>>>>>>>>>>>>>>>>>>>>>>>>> Deprecation warnings and errors will be surfaced in 
>>>>>>>>>>>>>>>>>>>>>>>>>> the DevTools issues
>>>>>>>>>>>>>>>>>>>>>>>>>> panel explaining the problem when it arises.
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Is this feature fully tested by
>>>>>>>>>>>>>>>>>>>>>>>>>> web-platform-tests
>>>>>>>>>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>>>>>>>>>>>>>> ? Yes
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> DevTrial instructions
>>>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/WICG/private-network-access/blob/main/HOWTO.md
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Flag name
>>>>>>>>>>>>>>>>>>>>>>>>>> PrivateNetworkAccessRespectPreflightResults
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Requires code in //chrome? False
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Tracking bug https://crbug.com/591068
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Launch bug https://crbug.com/1274149
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>>>>>>>>>>>>> DevTrial on desktop 98
>>>>>>>>>>>>>>>>>>>>>>>>>> DevTrial on android 98
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>>>>>>>>>>>>> https://chromestatus.com/feature/5737414355058688
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> Links to previous Intent discussions Intent to
>>>>>>>>>>>>>>>>>>>>>>>>>> prototype:
>>>>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/PrB0xnNxaHs/m/jeoxvNjXCAAJ
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome
>>>>>>>>>>>>>>>>>>>>>>>>>> Platform Status <https://www.chromestatus.com/>.
>>>>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>>>>>> You received this message because you are
>>>>>>>>>>>>>>>>>>>>>>>>>> subscribed to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fdAK%2BnrTfUzug8ub_DhV_LE0b7XrgZ7j5%2Bj_BHtW-FXg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>>>>> You received this message because you are
>>>>>>>>>>>>>>>>>>>>>>>>> subscribed to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f3dAnHromxwvp8jWRxVLYVKZ0PAG5snX2KDFAYz4kc7Q%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>> You received this message because you are subscribed
>>>>>>>>>>>>>>>>>>>>> to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>> blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9ePgpof%2BBDWS9X7sfHHAqgc6Arem3b78ZGC%3D%2Bp4jB6_AQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>> You received this message because you are subscribed to
>>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>>>>>>> from it, send an email to blink-dev+...@chromium.org.
>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6e557fb7-5b1d-20bc-aae5-65526ca8efb7%40chromium.org
>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/6e557fb7-5b1d-20bc-aae5-65526ca8efb7%40chromium.org?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9cFi-LJwPGc%3Dv7BTsR76oG8WXw09QP%2BRi36qffYhbkB3Q%40mail.gmail.com.

Reply via email to