bcc:net-dev
Primary
Summary
I'd like to block two kinds of subresource requests from webby documents:
1. Subresources with an "legacy" scheme (e.g. "ftp://my-awesome-ftp-server.com/yay.tiff")
2. Subresources with credentials (e.g. "http://ima_user:hun...@example.com/yay.tiff").
Motivation
1. Removing FTP subresources from webby pages would enable us to extract FTP support out of Chrome, handling top-level FTP requests via some other mechanism (Chrome app. protocol handler, etc). Given the low usage, and the code we could remove, this seems like a sizable win.
2. Hard-coding credentials into subresource requests is a) crazypants, b) problematic from a security perspective, as it's allowed folks to brute-force credentials in the past. This is especially the case for credentialed subresource requests that reach into internal IP ranges (your routers, etc). Given the low usage, closing this (small) security hole seems quite reasonable.
Compatibility Risk
This effects ~0.003% of page views. The impact would depend on the resource being loaded: best case, an image would be broken. Worst case, script wouldn't load and a page would be broken.
Alternative implementation suggestion for web developers
1. HTTP(S).
2. Cookies.
Usage information from UseCounter
Legacy schemed subresources are hovering around 0.0025% of page views[1]. Credentialed subresources are closer to 0.0033% of page views[2]. This potentially undercounts the enterprise, where I expect this sort of thing to be marginally more common.
I need to keep an eye on those numbers, though; they're both new in M39, and are displaying weird behavior this week. They were both around half where they currently are when I initially poked at folks internally about this topic. :/
[1]: https://www.chromestatus.com/metrics/feature/timeline/popularity/531
[2]: https://www.chromestatus.com/metrics/feature/timeline/popularity/532
Entry on chromestatus.com, crbug.com, or MDN
Requesting approval to remove too?
I'm on the fence. I'd like to just drop support. However, I suspect we'll need to add a flag for some level of enterprise support. +Saswat and Drew for their thoughts.
These sounds like very worthwhile changes, I hope it works out! As for the usage data, I usually wait until the top of the S-curve is clearly visible because it's hard to predict where it'll stop. Fingers crossed...
Philip
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
Are you asking to deprecate or block?
Also, is there good reason to believe this will overcome the problems Thomas mentioned?
On Mon, Dec 8, 2014 at 6:40 PM, Chris Harrelson <chri...@chromium.org> wrote:Are you asking to deprecate or block?Certainly deprecate. Block if you'll let me.
Also, is there good reason to believe this will overcome the problems Thomas mentioned?Yes. I'm meaner than Tom. :)
-mike
Credential bearing links are/were very common in file search sites, where they point to some sort of private FTP (IP addresses) URLs with credentials to download a file (MP3, for example).
> Yes. I'm meaner than Tom. :)
Meaning you expect the same use cases that were broken before to still be broken, but the benefits outweigh the costs?
All instances of 'gopher://' that I found were in CSS selectors like
'a[href ^="gopher://"]' so immediate removal of the gopher case LGTM,
if you want to do it.
For ftp and credentials-in-url the usage is high enough and potential
breakage large enough that it's unlikely to be completely smooth, so
eventually trying those removals with flags seems like a good idea.
If you do some searching in Google's internal index or the httparchive
data, maybe you can identify the biggest sites that depend on this
stuff, and maybe fixing only a few will see usage drop to a point
where removal is trivial. Worth a shot?
>
> -mike
>
--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To post to this group, send email to net...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CABJO0QJ%3DXMDJHQtLDY-d22q5A%3DJvHt43Bd%2BdS8Zo3HULmryOSw%40mail.gmail.com.