Note that Private Network Access is in the process of being renamed to Local Network Access, so you may see inconsistent names for the time being.
ph...@chromium.org, tit...@chromium.org, va...@chromium.org, cl...@chromium.org
https://github.com/WICG/local-network-access/blob/main/explainer.md
https://wicg.github.io/local-network-access
Local Network Access: Allow Potentially Trustworthy Same-Origin Fetches
Private Network Access: Preflight requests for subresources
Allow same-origin local network fetches to potentially-trustworthy origins and do not send preflights for them. We currently send preflights before all local network requests, but ignore the results, as proposed in Intent to Ship: Private Network Access preflight requests for subresources.
Blink>SecurityFeature>CORS>PrivateNetworkAccess
We haven’t been able to enforce the preflight results for private network requests because the compat risk is still too high. See this thread for discussions about the compat risk involved.
Preliminary metric data in dev and beta show that by excluding same-origin requests, we can reduce the number of ignored warnings by ~2x. Reducing the compat risk gets us closer to start enforcing the preflight results.
https://discourse.wicg.io/t/transfer-cors-rfc1918-and-hsts-priming-to-wicg/1726
https://github.com/w3ctag/design-reviews/issues/572
Added an FYI comment about this change.
This change reduces the compatibility risk of enforcing preflight results on private network requests as we now send fewer preflights for private network requests, so it’s less likely to break websites.
Gecko: No signal about this specific change.
WebKit: No signal about this specific change.
Web developers: No signal about this specific change, but they should be happy since this reduces compatibility risks.
Other signals:
None.
We plan to ship this change directly as this relaxes the previous restrictions.
This change is limited to potentially trustworthy origins. Proof of certificate protects users from DNS rebinding.
There’s no plan to ship Local Network Access on WebView.
Relevant information (client and resource IP address space) is already piped into the DevTools network panel.
Yes
https://github.com/WICG/private-network-access/blob/main/HOWTO.md
LocalNetworkAccessAllowPotentiallyTrustworthySameOrigin
Only for metric logging
Desktop 113
Android 113
https://chromestatus.com/feature/5737414355058688
Intent to prototype: https://groups.google.com/a/chromium.org/g/blink-dev/c/PrB0xnNxaHs/m/jeoxvNjXCAAJ
Intent to Experiment: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOC%3DiP%2Bew8hADZkdQ3AO6P9WzfGuzLPp9JjJZqztV5oZmaK8oQ%40mail.gmail.com
Intent to Ship: https://groups.google.com/a/chromium.org/g/blink-dev/c/72CK2mxD47c
Intent to Deprecate and Remove: Private Network Access requests for subresources without proper preflight response: https://groups.google.com/a/chromium.org/g/blink-dev/c/FlenxUPCDec/m/FNJ0wCmKBAAJ
This intent message was generated by Chrome Platform Status.