[PSA] Site Isolation team planning a Canary-only Strict Origin Isolation trial May 23-30.

135 views
Skip to first unread message

W. James MacLean

unread,
May 17, 2019, 4:42:19 PM5/17/19
to chromium-dev, site-isol...@chromium.org

tl;dr Starting May 23rd, for 1 week on desktop Canary channel only, we will be running a 50% A/B trial with the --enable-features=StrictOriginIsolation flag turned on. The trial will gauge the expected resource overhead (e.g. process count & memory) and performance (e.g. input latency) of isolating by origin rather than site (eTLD+1). Possible issues: users in the active trial group may find that sites that rely on modifying document.domain for cross-origin scripting may not function as expected, and resource usage may increase.


Details


To better understand the implications of providing finer-grained isolation, we will be running a trial where the isolation is based on unique origins, and not “site” (eTLD+1). This means that URLs like https://a.example.com and https://b.example.com will end up in different processes.


This will be of short duration, ~1 week for the active phase, and only on desktop Canary channel. We have no plans to extend this trial to other channels.


Trial contacts: wjma...@chromium.org, cr...@chromium.org, site-isol...@chromium.org


There are some cases where sites may not work as expected, namely those that rely on cross-origin scripting after modifying document.domain for their correct operation. We hope that the number of sites disrupted will be low, and the limited duration and scope should keep the impact low. The collected data will help inform important decisions about Chrome's process model and opt-in approaches for isolating particular origins.


If you’d like to experiment with the trial feature in advance or independently, you can enable it in chrome://flags/#strict-origin-isolation, or specify --enable-features=StrictOriginIsolation on the command line.


Further details can be found at https://www.chromium.org/Home/chromium-security/strict-origin-isolation-trial, including (i) how to determine if issues are specific to the trial, and (ii) if so, how to report them or opt-out of the trial.

W. James MacLean

unread,
May 23, 2019, 2:33:32 PM5/23/19
to chromium-dev, site-isol...@chromium.org
Just an FYI, this trial is now active.

-James

Daniel Bratell

unread,
May 24, 2019, 8:50:02 AM5/24/19
to chromium-dev, site-isol...@chromium.org, W. James MacLean
It seems pretty clear this will cause some sites to break, but will you have any idea how many? Maybe you have some kind of list for sites known to break that are then excluded?

/Daniel
--
--
Chromium Developers mailing list: chromi...@chromium.org
View archives, change email options, or unsubscribe:
http://groups.google.com/a/chromium.org/group/chromium-dev
---
You received this message because you are subscribed to the Google Groups "Chromium-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chromium-dev...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/chromium-dev/CADAYvof6XP%2B8gJBJmZ0S7Z7ZUqFkTae42LAQU0q4Hdx8UpjCdg%40mail.gmail.com.



--
/* Opera Software, Linköping, Sweden: CEST (UTC+2) */

W. James MacLean

unread,
May 24, 2019, 3:25:56 PM5/24/19
to Alex Gaynor, Daniel Bratell, chromium-dev, site-isol...@chromium.org
Daniel,

At present we have no good sense of how many sites. Less than 4% of sites modify document.domain, and not all of that will entail usage that we'll break. We are in touch with the few sites that we're aware of that might be affected, but given the short timeline and limited scoped of the trial, we aren't planning on implementing any sort of exclusion mechanism.

Alex,

To the best of our knowledge there are no frameworks that will be affected by this.

In addition to the Chromium site listed at the start of the thread, there are some further details at
https://docs.google.com/document/d/1O9Nja3YAWXgYAu0g73EP-Ib0gvWCK0MoWi7W7nGbvJo/edit?usp=sharing

Cheers,

James



On Fri, May 24, 2019 at 8:59 AM Alex Gaynor <alex....@gmail.com> wrote:
Similarly, are there any particular widely known frontend frameworks that you know rely on patterns that origin-per-process will break?

Alex

--
To unsubscribe from this group and stop receiving emails from it, send an email to site-isolation-...@chromium.org.


--
All that is necessary for evil to succeed is for good people to do nothing.

--
To unsubscribe from this group and stop receiving emails from it, send an email to site-isolation-...@chromium.org.

Mike West

unread,
May 28, 2019, 12:22:18 PM5/28/19
to wjma...@chromium.org, Alex Gaynor, Daniel Bratell, chromium-dev, site-isol...@chromium.org
On Fri, May 24, 2019 at 9:25 PM W. James MacLean <wjma...@chromium.org> wrote:
Daniel,

At present we have no good sense of how many sites. Less than 4% of sites modify document.domain, and not all of that will entail usage that we'll break. We are in touch with the few sites that we're aware of that might be affected, but given the short timeline and limited scoped of the trial, we aren't planning on implementing any sort of exclusion mechanism.

Tiny clarification: ~15% of page views alter `document.domain`: https://chromestatus.com/metrics/feature/timeline/popularity/739.

I would have said that only _has actual effect_ (either enabling or disabling an actual access attempt) on ~4% of page views, but it looks like that dropped significantly sometime last week (https://chromestatus.com/metrics/feature/timeline/popularity/2544). Let's hope that number keeps going down!
 
-mike

W. James MacLean

unread,
May 30, 2019, 9:36:28 AM5/30/19
to Mike West, Alex Gaynor, Daniel Bratell, chromium-dev, site-isol...@chromium.org
Thanks for the clarification Mike ... and for the additional metrics on document.domain usage!

-James
Reply all
Reply to author
Forward
0 new messages