Preloading HSTS for TLDs across browsers

282 views
Skip to first unread message

Lucas Garron

unread,
Oct 19, 2017, 5:31:35 PM10/19/17
to David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com

Hi everyone,


As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)


Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).


In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries,  but we need to figure out how. I see two options:

  • Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.

  • Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.


I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".


Here's a strawman proposalIf Firefox only filters out domains with policies that start with “bulk”, they will automatically retain the eTLD and (eTLD-requested entries) entries, without hard-coding more specific knowledge in their script. At present, non-bulk HSTS entries only make up about 1% of the list, so this shouldn't make a significant size impact.


dkeeler@/Mozilla folks: Does this approach look reasonable to you? Do you have any other desires/requirements?


Gabriel/Microsoft: If Mozilla includes TLDs in their list, can you confirm whether Microsoft will automatically pick those up?


Anyone else who processes the preload list: Do you ever want to distinguish between kinds of preloaded entries beyond this kind of policy classification?


»Lucas

Ryan Sleevi

unread,
Oct 19, 2017, 10:19:14 PM10/19/17
to Lucas Garron, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:

Hi everyone,


As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)


Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).


In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries,  but we need to figure out how. I see two options:

  • Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.

  • Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.


I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".


Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?

Lucas Garron

unread,
Oct 20, 2017, 4:15:42 PM10/20/17
to rsl...@chromium.org, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
Good to know! I also find eTLD a pretty awkward term. :-(

In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.

For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.
 
If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.
To post to this group, send email to hsts-d...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/hsts-discuss/CACvaWvZOntrTEZ2jTrj7rryZ1zKNR57%3DGh3PSKpX88WM-e4nHA%40mail.gmail.com.

Eric Mill

unread,
Oct 20, 2017, 4:32:22 PM10/20/17
to Lucas Garron, rsl...@chromium.org, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
On Fri, Oct 20, 2017 at 4:15 PM, 'Lucas Garron' via HSTS Discuss <hsts-d...@chromium.org> wrote:


On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:
On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:

Hi everyone,


As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)


Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).


In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries,  but we need to figure out how. I see two options:

  • Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.

  • Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.


I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".


Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?

Good to know! I also find eTLD a pretty awkward term. :-(

In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.

For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.
 
If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?

I think you could probably drop "-gov" from the label either way. Though .gov is the first, and maybe the second will also be a government, there's nothing inherently government-specific about it. The idea here would be a class of domains for which the TLD is in a position to authorize their preloading as a policy matter, but not in a technical manner (at least not via the currently employed technical manner, via a HSTS flag).

Though I don't work on a browser, I do parse the preload list as part of enforcement/compliance efforts, and an annotation approach would be the easiest from a client perspective (and also likeliest to lead to consistent results across clients/browsers).

-- Eric

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.



--
Eric Mill
Senior Advisor, Technology Transformation Services, GSA

bi...@eff.org

unread,
Oct 20, 2017, 4:33:33 PM10/20/17
to HSTS Discuss, dke...@mozilla.com, kmck...@mozilla.com, ta...@mozilla.com, Gabriel.M...@microsoft.com
As stated in the issue here and discussion here, the HTTPS Everywhere extension would benefit from annotation.

Currently, we use our CI to determine if a domain in a submitted ruleset is HSTS preloaded or not.  Since we don't want to repeat the preloaded domains within our extension, if it's already included in the preload list for all supported browsers, we fail the test.  However, if a ruleset is included in the preload list but it does not have the prerequisite headers to keep it there for very long, we pass the test.  We don't want to be removing rulesets which will potentially be useful in the future.

However, as stated above, certain domains are not going to be removed regardless of their failure to include the prerequisite headers.  It would be useful to know this for our CI, and for a clear policy to be stated on how this affects inclusion in each of the browsers.

Bill Budington
Security Engineer & Technologist
Electronic Frontier Foundation

Lucas Garron

unread,
Oct 20, 2017, 5:04:47 PM10/20/17
to Eric Mill, rsl...@chromium.org, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
On Fri, Oct 20, 2017 at 1:32 PM Eric Mill <eric...@gsa.gov> wrote:
On Fri, Oct 20, 2017 at 4:15 PM, 'Lucas Garron' via HSTS Discuss <hsts-d...@chromium.org> wrote:


On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:
On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:

Hi everyone,


As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)


Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).


In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries,  but we need to figure out how. I see two options:

  • Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.

  • Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.


I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".


Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?

Good to know! I also find eTLD a pretty awkward term. :-(

In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.

For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.
 
If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?

I think you could probably drop "-gov" from the label either way. Though .gov is the first, and maybe the second will also be a government, there's nothing inherently government-specific about it. The idea here would be a class of domains for which the TLD is in a position to authorize their preloading as a policy matter, but not in a technical manner (at least not via the currently employed technical manner, via a HSTS flag).

Good point. I imagined we would distinguish different eTLD-owner requested TLD policies, but on reflection there is unlikely to be a functional policy difference, and you can get the eTLD from the domain itself. I've dropped the "-gov" suffix from the tentative plan. :-)
 

Though I don't work on a browser, I do parse the preload list as part of enforcement/compliance efforts, and an annotation approach would be the easiest from a client perspective (and also likeliest to lead to consistent results across clients/browsers).

-- Eric

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

Ryan Sleevi

unread,
Oct 22, 2017, 7:31:55 AM10/22/17
to Lucas Garron, Ryan Sleevi, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
On Fri, Oct 20, 2017 at 4:15 PM, Lucas Garron <lga...@google.com> wrote:


On Thu, Oct 19, 2017 at 7:19 PM Ryan Sleevi <rsl...@chromium.org> wrote:
On Thu, Oct 19, 2017 at 5:31 PM, Lucas Garron <lga...@chromium.org> wrote:

Hi everyone,


As recently announced, Google has just preloaded several new TLDs in Chrome. We are also talks with other security-conscious TLD owners about preloading their TLDs. This approach is powerful because it permanently protects a whole swath of domains, rather than requiring an entry for each domain (which takes more space in the preload list, and take time to roll out for each domain). We would like all these preloaded TLDs to reach all browsers. :-)


Right now, Mozilla’s script for filtering the Chromium list removes most TLDs, because it can’t connect to TLDs to verify their HSTS headers like it can for normal domains. This means the entries are not reaching Firefox, and they are also not reaching Microsoft's operating systems and browsers (which pull from the filtered Firefox list).


In a preliminary email thread, Mozilla indicated they were open to picking up TLD entries,  but we need to figure out how. I see two options:

  • Keep the format of the Chromium list, and modify Mozilla’s script not to filter out any entries that appear to be TLDs.

  • Annotate the entries in Chromium and update the Mozilla script not to filter out entries with certain annotations.


I have an idea for the latter approach that also solves several other problems I’m currently facing: add a “policy” field to each entry in the Chromium source. I’ve scoped this out here, and the set of policies would look something like this: "test", "etld", "google", "custom", "bulk-legacy", "bulk-18-weeks", "bulk-1-year", "etld-requested-gov".


Could you clarify more about "etld" and "etld-requested-gov"? We've been trying to stay away from terminology re: eTLD in the various spaces, so it might be helpful to be precise. That is, is it just related to TLDs? Or is there more you expect (e.g. ccTLDs)?

Good to know! I also find eTLD a pretty awkward term. :-(

In general, it is beneficial to preload parent domains instead of individual child domains. Although we are only in talks with gTLDs right now, I would be eager to preload any public suffix that is ready – old TLDs, gTLDs, ccTLDs, or anything at publicsuffix.org.

For "eTLD-owner requested", the only TLD with which we currently have an arrangement is .gov. However, I believe there is interest from gov.uk (an SLD), and I'm hoping the approach might help other public suffixes who want to deprecate HTTP for new domains going forward.
 
If it's just a matter of terminology, is "public suffix" or oversimplification to "TLD" a good alternative?

Oh, I see. I was assuming, apparently incorrectly, that entries on the public suffix list would be excluded. That is, I think it's reasonable to preload gTLDs (under the new ICANN contracting structure), and potentially ccTLDs (due to the existing [lack of] restrictions), but would be uncomfortable with preloading legacy TLDs or arbitrary public suffices as a special case. 

Gabriel Montenegro

unread,
Oct 24, 2017, 5:19:37 PM10/24/17
to rsl...@chromium.org, Lucas Garron, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas

Hi folks,

 

At this moment we can’t consume “eTLD”s, unfortunately. I have not had a chance to discuss in detail with the developers in charge. I think the “policy” field makes sense going forward, although, of course, we can’t consume it at this point.

 

Gabriel

Daniel Veditz

unread,
Oct 25, 2017, 11:10:55 PM10/25/17
to rsl...@chromium.org, Lucas Garron, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
On Sun, Oct 22, 2017 at 4:31 AM, Ryan Sleevi <rsl...@chromium.org> wrote:
Oh, I see. I was assuming, apparently incorrectly, that entries on the public suffix list would be excluded. That is, I think it's reasonable to preload gTLDs (under the new ICANN contracting structure), and potentially ccTLDs (due to the existing [lack of] restrictions), but would be uncomfortable with preloading legacy TLDs or arbitrary public suffices as a special case. 

​I agree. I've got no problem preloading gTLDs (assuming the registrar explicitly acknowledges the unhappiness this could cause existing customers)​ and get more uncomfortable when we start talking about legacy TLDs. Entries on the public suffix list could already serve HSTS headers so I'm less concerned about adding them to the preload list if they request it.

-
​Dan Veditz​

Eric Mill

unread,
Oct 26, 2017, 2:16:49 AM10/26/17
to Daniel Veditz, rsl...@chromium.org, Lucas Garron, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
I don't think anyone's been suggesting preloading legacy TLDs in a blunt way. Right now, entries that in some way relate to TLDs fall into two buckets:

1. New TLDs that opt in to being preloaded. These don't get processed downstream by Mozilla or Microsoft right now.
2. SLDs that legacy TLDs request be preloaded by fiat (regardless of any ability for a client to see an HSTS header for them). These may get processed by some clients, but Mozilla would drop those that don't advertise an HSTS header (and IIRC Microsoft is downstream from Mozilla).

Right now, #1 is used by a handful of recent TLDs, including .google and .dev. 

Right now, #2 is just .gov, whose policy as a managed TLD is to routinely preload a category of newly registered domains as they are registered[1], but there's nothing specific to .gov (or government) about this process.

In late 2016, at the gathering Lucas referenced, I proposed that browsers consider possible mechanisms to give legacy TLDs (and public suffixes) a viable pathway towards preloading themselves -- if not entirely, at least asymptotically. 

One mechanism would be for browsers to support carveouts (i.e. preload this zone *except* for these specific names within it). This has been requested before by SLD owners for carveouts for particular subdomains, and reasonably rejected as not worthwhile at that level. However, carveouts for TLDs that except specific SLDs might have a better cost-benefit ratio, if it allows small- or medium-sized TLDs and public suffixes to set rules like "preload *.gov except for these X,000 legacy hostnames". This creates a fully known and contained HTTP surface area, and allows the TLD to focus on deleting those whitelist entries over time, while all future hostnames within its zone are automatically covered.

But regardless of whether a carveout mechanism for TLDs ever happens, the policy attributes that Lucas is suggesting don't speak to any imminent plan to preload legacy TLDs that I'm aware of. I would expect that any legacy TLD, small or large, would want to examine more graceful pathways that don't risk breaking swathes of things, while still finding ways to lift its security level.

-- Eric


--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

Ryan Sleevi

unread,
Oct 26, 2017, 8:16:35 AM10/26/17
to Eric Mill, Daniel Veditz, Ryan Sleevi, Lucas Garron, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
To be clear: My concern is specifically with public suffices, which do not have the same administrative boundaries of control as legacy TLDs such as .gov, ccTLDs such as .uk, or gTLDs such as .google.

gTLDs' policies on registration are addressed during the ICANN application process as to whether they will allow open registration, limited registration subject to policies, or sole registration
ccTLDs are allocated based on the country code recognition and neither ICANN or IANA apply specific policies with respect to registration
Legacy TLDs are handled on a case-by-case basis - that is, .com, .gov, .org, and .aero each had their own policies with respect to registration, handled by ICANN

gTLDs and ccTLDs rarely change in "surprising" ways - that is, gTLDs go through enough process that, in general, change constitutes removal, rather than a transfer of ownership and a change in policies (the process is designed to prevent more restrictive policies from being negotiated once delegated). ccTLDs can change based on administrative whim, but a set of policies as significant as HSTS are not ones to get into lightly.

Legacy TLDs are more or less inflexible - change is measured glacially, given their broad use.

However, those sorts of SLDs and eTLDs undergo incredible change - and the bounding of the policy expression is only as long as the domain registration, and these registrations are, fairly frequently (unfortunately), short lived (O(1-3 years)) and will change as companies rise and fall.

For that reason, and the administrative burden in determining who are the acceptable entities to appropriately request such policy imposition, I think allowing such registrations is probably more detrimental than positive.

These are just the experiences of (one) PSL maintainer who gets increasingly concerned with new consumers of the PSL, due to its many (unsolved) problems.

Lucas Garron

unread,
Nov 15, 2017, 2:25:28 PM11/15/17
to rsl...@chromium.org, Eric Mill, Daniel Veditz, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
I don't believe I've heard back from Mozilla on this thread yet, but it looks like this change will be sufficiently useful for other purposes, and also work with Mozilla's script if they are willing to take TLD entries. Martijn C. has sent a CL for adding annotations in the Chromium source, and I will plan to land it.

I'll keep in mind the concerns about preloading public suffixes that aren't as likely to have long-term stewards who are comfortable with the security tradeoff.
Public suffixes can't be preloaded through hstspreload.org and I don't really get emails requesting to preload any non-gTLD public suffixes (although some preloaded domains were added to the public suffix list afterwards?), so I'll worry about that when we get there.

»Lucas

To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
--
Eric Mill
Senior Advisor, Technology Transformation Services, GSA

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

J.C. Jones

unread,
Nov 16, 2017, 5:22:03 PM11/16/17
to Lucas Garron, Ryan Sleevi, Eric Mill, Daniel Veditz, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
Lucas,

Sorry for the delay. This policy approach in Issue #111 works for Mozilla. We'll be standing by to update our scripts when the new format is settled.

Cheers,
J.C.

To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
--
Eric Mill
Senior Advisor, Technology Transformation Services, GSA

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

Lucas Garron

unread,
Nov 16, 2017, 5:34:03 PM11/16/17
to J.C. Jones, Ryan Sleevi, Eric Mill, Daniel Veditz, David Keeler, hsts-d...@chromium.org, Kate McKinley, Tanvi Vyas, Gabriel.M...@microsoft.com
Hello J.C.,

Excellent, it all just landed! 😊
I've filed Bugzilla bug 1418112 to track this.

Thanks,
»Lucas

To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
--
Eric Mill
Senior Advisor, Technology Transformation Services, GSA

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss...@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

Eric Lawrence

unread,
Jun 11, 2018, 5:02:12 PM6/11/18
to HSTS Discuss, j...@mozilla.com, rsl...@chromium.org, eric...@gsa.gov, dve...@mozilla.com, dke...@mozilla.com, kmck...@mozilla.com, ta...@mozilla.com, Gabriel.M...@microsoft.com
Support for HSTS preloading of TLDs has landed for Microsoft Edge and Internet Explorer, slated to reach stable with the Windows 10 Fall Update coming later this year. The improvement should be visible in the Windows Insider fast ring builds shortly.

-Eric Lawrence
Microsoft Edge Networking
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
--
Eric Mill
Senior Advisor, Technology Transformation Services, GSA

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

--
You received this message because you are subscribed to the Google Groups "HSTS Discuss" group.
To unsubscribe from this group and stop receiving emails from it, send an email to hsts-discuss+unsubscribe@chromium.org.

To post to this group, send email to hsts-d...@chromium.org.
Reply all
Reply to author
Forward
0 new messages