Chrome is removing support for signature algorithms using SHA-1 for server signatures during the TLS handshake. This does not affect SHA-1 support in server certificates, which was already removed, or in client certificates, which continues to be supported. SHA-1 can be temporarily re-enabled via the temporary InsecureHashesInTLSHandshakesEnabled enterprise policy. This policy will be removed in Chrome 123.
At most 0.02% of page loads use the SHA1 fallback. However, we cannot disambiguate between a flaky first connection, and actually requiring SHA1. We expect the actual amount is lower.
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
None
n/a, this happens pre-devtools
Shipping on desktop | 117 |
OriginTrial desktop last | 116 |
OriginTrial desktop first | 115 |
DevTrial on desktop | 115 |
Shipping on Android | 117 |
OriginTrial Android last | 116 |
OriginTrial Android first | 115 |
DevTrial on Android | 115 |
OriginTrial webView last | 116 |
OriginTrial webView first | 115 |
Open questions about a feature may be a source of future web compat or interop issues. Please list open issues (e.g. links to known github issues in the project for the feature specification) whose resolution may introduce web compat/interop risk (e.g., changing to naming or structure of the API in a non-backward-compatible way).
None--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42LiSGgfN1trVXfrmCW0Upk9r9GK4XYZQm5Y8RSzphn_DA%40mail.gmail.com.
> This should probably be an "Intent to Deprecate and Remove" rather than an "Intent to Ship".
You're absolutely right that it should be, unfortunately that's not the subject Chrome Status generated. I'll file an issue.
On Mon, Sep 18, 2023 at 4:11 PM David Adrian <dad...@google.com> wrote:> This should probably be an "Intent to Deprecate and Remove" rather than an "Intent to Ship".
You're absolutely right that it should be, unfortunately that's not the subject Chrome Status generated. I'll file an issue.Oops, yes, you did everything right here. There's already https://github.com/GoogleChrome/chromium-dashboard/issues/2749 about changing this subject line, and now https://github.com/GoogleChrome/chromium-dashboard/issues/3346 to align the Chrome Status UI with the launching-features page.> The RFC's introduction at https://www.rfc-editor.org/rfc/rfc9155.html#name-introduction is a pretty good explainer for why we should remove SHA-1 signatures.
Agreed. Noting in general, there is a large process mismatch between TLS launches and the Blink launch process, as discussed in https://groups.google.com/a/chromium.org/g/blink-dev/c/CmlXjQeNWDI/m/r-AUe0OqAQAJ. That's why this Intent looks a little different.
As for the launch itself, I'll note it's been at 10% on Finch for a couple weeks and everything looks gray, so we should be safe to ramp up to 100%. The only thing of note was a correlation with an unrelated crash in Blink, since the deprecation rollout was fairly large. It only showed at 10%, not 1%.On Mon, Sep 18, 2023 at 3:53 PM Jeffrey Yasskin <jyas...@google.com> wrote:This should probably be an "Intent to Deprecate and Remove" rather than an "Intent to Ship". I'll let an API owner say if there's a reason to re-send it; probably there isn't.On Mon, Sep 18, 2023 at 3:47 PM 'David Adrian' via blink-dev <blin...@chromium.org> wrote:The RFC's introduction at https://www.rfc-editor.org/rfc/rfc9155.html#name-introduction is a pretty good explainer for why we should remove SHA-1 signatures.Specification
https://www.rfc-editor.org/rfc/rfc9155.htmlSummary
Chrome is removing support for signature algorithms using SHA-1 for server signatures during the TLS handshake. This does not affect SHA-1 support in server certificates, which was already removed, or in client certificates, which continues to be supported. SHA-1 can be temporarily re-enabled via the temporary InsecureHashesInTLSHandshakesEnabled enterprise policy. This policy will be removed in Chrome 123.
Blink component
Internals>Network>SSLSearch tags
tls, ssl, sha1TAG review
NoneTAG review status
Not applicableRisks
Interoperability and Compatibility
At most 0.02% of page loads use the SHA1 fallback. However, we cannot disambiguate between a flaky first connection, and actually requiring SHA1. We expect the actual amount is lower.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANh-dXnM7SzAOh2y6hcuezDpo-yCW%3DtNg0%3D1ErEMCFN%3DSSpsQQ%40mail.gmail.com.
On Tue, Sep 19, 2023 at 1:35 AM 'Jeffrey Yasskin' via blink-dev <blin...@chromium.org> wrote:On Mon, Sep 18, 2023 at 4:11 PM David Adrian <dad...@google.com> wrote:> This should probably be an "Intent to Deprecate and Remove" rather than an "Intent to Ship".
You're absolutely right that it should be, unfortunately that's not the subject Chrome Status generated. I'll file an issue.Oops, yes, you did everything right here. There's already https://github.com/GoogleChrome/chromium-dashboard/issues/2749 about changing this subject line, and now https://github.com/GoogleChrome/chromium-dashboard/issues/3346 to align the Chrome Status UI with the launching-features page.> The RFC's introduction at https://www.rfc-editor.org/rfc/rfc9155.html#name-introduction is a pretty good explainer for why we should remove SHA-1 signatures.
Agreed. Noting in general, there is a large process mismatch between TLS launches and the Blink launch process, as discussed in https://groups.google.com/a/chromium.org/g/blink-dev/c/CmlXjQeNWDI/m/r-AUe0OqAQAJ. That's why this Intent looks a little different.I wouldn't categorize it as a large process mismatch. But that's an orthogonal discussion.
As for the launch itself, I'll note it's been at 10% on Finch for a couple weeks and everything looks gray, so we should be safe to ramp up to 100%. The only thing of note was a correlation with an unrelated crash in Blink, since the deprecation rollout was fairly large. It only showed at 10%, not 1%.
Any way to sample a few sites to validate that assumption?
Also, are those 0.02% driven by origins? Specific user platforms? Something else?
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVPG6np80msDXGDyzqOMA6E-7mtqFQpDSw8w5m3X%3DEKOg%40mail.gmail.com.
Also, are those 0.02% driven by origins? Specific user platforms? Something else?This is 0.02% of TLS connections (sorry, page loads was a typo).
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXorTe7SSPt8iZt5ZjVi0Qh8qd%2BPdEGMOzSQj45e0Z1VQ%40mail.gmail.com.
LGTM2 (for the original request, just to be clear)
I assume it will have the normal flag that will allow it to be turned off if our interpretation is incorrect, since it is so hard to measure with a high accuracy.
/Daniel
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaB5P6Ys%3DxMyB%3D7HvLJEa0Axp5uCcfbPQqurN2ADdasYgQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/29ca51ba-5890-4767-82d1-0e4e21669374%40gmail.com.