Intent to Remove: Insecure usage of EME

1907 kali dilihat
Langsung ke pesan pertama yang belum dibaca

Emily Schechter

belum dibaca,
8 Des 2016 22.27.4308/12/16
kepadablin...@chromium.org, ddo...@chromium.org, mk...@chromium.org, Joel Weinberger

Primary eng (and PM) emails

emilysc...@chromium.org, ddo...@chromium.org


Link to “Intent to Deprecate” thread


Summary

Following our powerful feature policy, we intend to remove support for EME APIs over non-secure contexts at the end of Q1 2017.


Motivation

Support for non-secure contexts has been removed from EME v1 spec and will not be in the upcoming Proposed Recommendation (PR) or subsequent final Recommendation. The API was included in the original intent-to-deprecate and listed on the Chromium wiki page starting in Feb 2015, and has been showing a deprecation message since May 2015. If approved, the deprecation message will be updated to include the concrete timeframe.


Some usages of EME expose DRM implementations that are not open source, involve access to persistent unique identifiers, and/or run unsandboxed or with privileged access. The risks are increased when exposed via insecure HTTP, because they could be attacked by anyone on the channel. In addition, for implementations that require explicit permissions, permission for an insecure HTTP site can be exploited.


Compatibility Risk

This will break a small number of media sites who do not transition to HTTPS by the time of removal. As these sites transition to HTTPS, the risk becomes lower. We have a good communication channel with many of the sites currently using EME in non-secure contexts, which makes the risk much lower.

EME support in Chrome: since M42 (unprefixed)

Firefox: deprecation plans.


Usage information from UseCounter

EME over insecure origins: 0.002% of page loads (link).

EME over secure origins: 0.009% of page loads (link)


OWP launch tracking bug

https://crbug.com/672605 for EME

https://crbug.com/520765 for broader removal of old powerful features on insecure origins.


Entry on the feature dashboard

https://www.chromestatus.com/feature/5724389932793856

Jochen Eisinger

belum dibaca,
9 Des 2016 03.04.1809/12/16
kepadaEmily Schechter, blin...@chromium.org, ddo...@chromium.org, mk...@chromium.org, Joel Weinberger
lgtm1

Mike West

belum dibaca,
9 Des 2016 04.50.3809/12/16
kepadaJochen Eisinger, Emily Schechter, blink-dev, ddo...@chromium.org, Joel Weinberger
Non-OWNER's LGTM. I don't believe any new information has popped up since we decided to deprecate this in non-secure contexts, and the deprecation warning in conjunction with y'all's outreach seems to have been effective in driving the numbers down to levels where I'm confident that the impact to developers is outweighed by the benefits.

Thanks for following through on this!

-mike

TAMURA, Kent

belum dibaca,
9 Des 2016 05.05.3609/12/16
kepadaMike West, Jochen Eisinger, Emily Schechter, blink-dev, David Dorwin, Joel Weinberger
LGTM2

--
TAMURA Kent
Software Engineer, Google


PhistucK

belum dibaca,
9 Des 2016 11.44.1809/12/16
kepadaEmily Schechter, blink-dev, David Dorwin, Mike West, Joel Weinberger

On Fri, Dec 9, 2016 at 5:27 AM, Emily Schechter <emilysc...@chromium.org> wrote:
EME over secure origins: 0.009% of page loads (link)

With such a low usage, it looks like you can remove the feature altogether, secure or insecure. ;)​



PhistucK

Chris Harrelson

belum dibaca,
9 Des 2016 12.37.4109/12/16
kepadaPhistucK, Emily Schechter, blink-dev, David Dorwin, Mike West, Joel Weinberger
LGTM3

--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.

Pesan telah dihapus
Pesan telah dihapus

kid.mira...@gmail.com

belum dibaca,
25 Jan 2017 08.53.4025/01/17
kepadablink-dev, ddo...@chromium.org, mk...@chromium.org, j...@chromium.org, emilysc...@chromium.org
Will secure origin be required for apps hosted on private networks?  - thinking about impact on internal test systems...


Jochen Eisinger

belum dibaca,
25 Jan 2017 08.54.2725/01/17
kepadakid.mira...@gmail.com, blink-dev, ddo...@chromium.org, mk...@chromium.org, j...@chromium.org, emilysc...@chromium.org
we internal testing, you can always run chrome with command line options to mark individual URLs as secure

elst...@gmail.com

belum dibaca,
21 Apr 2017 14.43.2721/04/17
kepadablink-dev, kid.mira...@gmail.com, ddo...@chromium.org, mk...@chromium.org, j...@chromium.org, emilysc...@chromium.org
Can you let me know the command line option to mark individual URLs as secure?

Emily Schechter

belum dibaca,
21 Apr 2017 14.46.2721/04/17
kepadaelst...@gmail.com, blink-dev, kid.mira...@gmail.com, ddo...@chromium.org, mk...@chromium.org, Joel Weinberger, Emily Schechter
There are developer instructions here ("If a feature is powerful and not available on HTTP, and you are a developer that needs to keep testing a feature on a server that does not have a valid certificate, you have several options...")

Xiaohan Wang (王消寒)

belum dibaca,
21 Apr 2017 14.46.3221/04/17
kepadaelst...@gmail.com, blink-dev, kid.mira...@gmail.com, David Dorwin, mk...@chromium.org, j...@chromium.org, emilysc...@chromium.org
(copied from earlier communications)

For development and test, you can:
Xiaohan

On Fri, Apr 21, 2017 at 11:43 AM, <elst...@gmail.com> wrote:
Balas ke semua
Balas ke penulis
Teruskan
0 pesan baru