Requires that private network requests for subresources may only be initiated from a secure context. "Private network requests" are those initiated from a public network, targeting a private network. Examples include internet to intranet requests and intranet loopbacks. This is a first step towards fully implementing CORS-RFC1918: https://chromestatus.com/feature/5733828735795200
< 1% of page views are currently loading at least one resource from a loopback address, and this change would affect them in one way or another:
- https://www.chromestatus.com/metrics/feature/timeline/popularity/3689
- https://www.chromestatus.com/metrics/feature/timeline/popularity/3691
- https://www.chromestatus.com/metrics/feature/timeline/popularity/3693
- https://www.chromestatus.com/metrics/feature/timeline/popularity/3695
- https://www.chromestatus.com/metrics/feature/timeline/popularity/3697
Note that the above metrics almost certainly overestimate the affected page loads as some frame hierarchies currently confuse Blink: https://crbug.com/1136028. Previous estimates based on less precise metrics suggested that this was much less widespread.
In any case, we are waiting for more detailed metrics gathered in M87 to finalize our plan to ship the feature. We have an enterprise opt-out through enterprise policies. This is a bit unfortunate, as enterprises are exactly the sort of things that have large local networks full of interesting resources, but necessary.
Developers of non-secure sites that rely upon local servers will need to upgrade to HTTPS. This might cause some complications, as mixed-content checks will begin to apply. Chrome carves out HTTP access to loopback (as perhttps://w3c.github.io/webappsec-secure-contexts/#localhost), which is a release valve for folks who don't want to go through the effort of securely-distributing certs for local servers.
This change should be security-positive.
When blocking a request due to a secure-context restriction, we'll add a helpful message to the console. The devtools network panel will show information about the source and remote address spaces at play.
Contact emails
tit...@chromium.org, cl...@chromium.org, mk...@chromium.org, va...@chromium.orgExplainer
https://github.com/WICG/cors-rfc1918/blob/master/explainer.mdSpecification
https://wicg.github.io/cors-rfc1918/API spec
YesDesign docs
https://docs.google.com/document/d/1tIl8F0i31_z6gttaaPmRDynHBqWsLaV_94ngrpg5Oeg/edit#heading=h.lnbc74amxd9e
https://docs.google.com/document/d/15r4PQdHJa3SunkGg0RDgm6MlcCdWSZLJj9Cq2awSLvo/editSummary
Requires that private network requests for subresources may only be initiated from a secure context. "Private network requests" are those initiated from a public network, targeting a private network. Examples include internet to intranet requests and intranet loopbacks.
This is a first step towards fully implementing CORS-RFC1918: https://chromestatus.com/feature/5733828735795200
Blink component
BlinkTAG review
https://github.com/w3ctag/design-reviews/issues/572TAG review status
PendingRisks
Interoperability and Compatibility
< 1% of page views are currently loading at least one resource from a loopback address, and this change would affect them in one way or another: - https://www.chromestatus.com/metrics/feature/timeline/popularity/3689 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3691 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3693 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3695 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3697
Note that the above metrics almost certainly overestimate the affected page loads as some frame hierarchies currently confuse Blink: https://crbug.com/1136028. Previous estimates based on less precise metrics suggested that this was much less widespread.
In any case, we are waiting for more detailed metrics gathered in M87 to finalize our plan to ship the feature. We have an enterprise opt-out through enterprise policies. This is a bit unfortunate, as enterprises are exactly the sort of things that have large local networks full of interesting resources, but necessary.
Gecko: No signal (https://github.com/mozilla/standards-positions/issues/143) https://bugzilla.mozilla.org/show_bug.cgi?id=1481298
WebKit: No signal
Web developers: Negative (https://bugs.webkit.org/show_bug.cgi?id=171934) Developers running local servers generally want those servers to keep running without alteration. The conversation on a tangentally-related WebKit bug is representative.
On Friday, November 20, 2020 at 10:47:51 PM UTC+1 Titouan Rigoudy wrote:Contact emails
tit...@chromium.org, cl...@chromium.org, mk...@chromium.org, va...@chromium.orgExplainer
https://github.com/WICG/cors-rfc1918/blob/master/explainer.mdSpecification
https://wicg.github.io/cors-rfc1918/API spec
YesDesign docs
https://docs.google.com/document/d/1tIl8F0i31_z6gttaaPmRDynHBqWsLaV_94ngrpg5Oeg/edit#heading=h.lnbc74amxd9e
https://docs.google.com/document/d/15r4PQdHJa3SunkGg0RDgm6MlcCdWSZLJj9Cq2awSLvo/editSummary
Requires that private network requests for subresources may only be initiated from a secure context. "Private network requests" are those initiated from a public network, targeting a private network. Examples include internet to intranet requests and intranet loopbacks.
To clarify, the network requests to those private networks will be done over non-secure HTTP, and will not be considered mixed content?
This is a first step towards fully implementing CORS-RFC1918: https://chromestatus.com/feature/5733828735795200
Blink component
BlinkTAG review
https://github.com/w3ctag/design-reviews/issues/572TAG review status
PendingRisks
Interoperability and Compatibility
< 1% of page views are currently loading at least one resource from a loopback address, and this change would affect them in one way or another: - https://www.chromestatus.com/metrics/feature/timeline/popularity/3689 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3691 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3693 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3695 - https://www.chromestatus.com/metrics/feature/timeline/popularity/3697
Note that the above metrics almost certainly overestimate the affected page loads as some frame hierarchies currently confuse Blink: https://crbug.com/1136028. Previous estimates based on less precise metrics suggested that this was much less widespread.
In any case, we are waiting for more detailed metrics gathered in M87 to finalize our plan to ship the feature. We have an enterprise opt-out through enterprise policies. This is a bit unfortunate, as enterprises are exactly the sort of things that have large local networks full of interesting resources, but necessary.
Gecko: No signal (https://github.com/mozilla/standards-positions/issues/143) https://bugzilla.mozilla.org/show_bug.cgi?id=1481298
WebKit: No signal
Web developers: Negative (https://bugs.webkit.org/show_bug.cgi?id=171934) Developers running local servers generally want those servers to keep running without alteration. The conversation on a tangentally-related WebKit bug is representative.My read of that thread is that folks would want to keep the possibility to access either localhost or local servers, but that the restriction of that access to secure contexts would not be a huge blocker for their use-cases. Am I understanding correctly?
I think having the whole compatibility picture, including the current dark matter in the "unknown" address space, is required before judging the impact the web will see from this. Especially since something that is more or less a bug fix (change "unknown" to something more correct) could otherwise expand the usage beyond what is tolerable.
My hope is that your suspicions are correct, but I think we should see what the data says after your improvements to the classifications.
/Daniel
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fggPNQwczgSKoHX9C58PijAPoUQOR9ETJzY9PXJdT-kw%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9dVhgetAgvXPmpbCC%3DLQ7vQU_NvMiqY3rvNfHh7TSXP8w%40mail.gmail.com.
Hi Chris,What matters is not the domain name of the website but rather the IP address from which it was loaded. If the router serves its own configuration website (responds to the DNS request with its own private IP address), then the website should not make cross-origin / cross-network requests. Thus it should be unaffected by this intent.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9f48xehxkD3B4KyGo8QZ1UKjsGSVDCftj48dtOSefe3Sg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAPATO9fFaUWuatrCCROsrR1JJ1tPbvqAiL7hFyFGY75z4daSnA%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBPxqGd4KSizo6r3hNSpjKMYQe08q3Et8WsJDhYpNfNKew%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw86TgADuT7H%3D3qM3LnkELreJFbg9MmYKoK23TZDhT1vKw%40mail.gmail.com.
Hi Chris,
The new metrics are currently only available on canary and we know from earlier analysis that canary data was not reflecting the same distribution as dev/stable.
Therefore we're not sure yet! We'll monitor the metrics as soon as they hit additional channels. But we're thinking about adding the warning in M90 (CL adding it needs to land before 2021-02-25) to let the affected user know about the upcoming change. This will help us to spread the information about the upcoming change and bring the use counter down. Is this fine with you?
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBOawYEzd3b2BRGrn4iAXhqq4mj5OPWUV%3DF-dsk-Ayemrw%40mail.gmail.com.
Really good to have gotten rid of the dark matter in the metrics! The range initially was about 0.08 - 1.0%, and now it's about 0.1% (the Canary data you link is Google internal so I have not checked anything myself).
The number 0.1% is still high if it means a service/device/page
would be broken, but you don't expect that to be the case come
final shipping in the summer? Sorry if I'm asking something that
has already been answered, but I can't remember an answer. You
were going to reach out to possibly affected services/device
makers?
And it's perfect that is is scoped to subresources since that is the part we have been evaluating.
/Daniel