Which version of Chrome are you wanting to ship in? Joe Medley | Technical Writer, Chrome DevRel | jmed...@google.com | 816-678-7195 *If an API's not documented it doesn't exist.*
On Wed, Feb 16, 2022 at 8:20 AM Daniel Bratell <bratel...@gmail.com> wrote: > LGTM3 > > Comment about double checking the security review stands. > > (We decided this was fine two weeks ago but not all the necessary mails > ended up on the list - our fault, good that you pinged us!) > > /Daniel > On 2022-02-16 13:39, 'Victor Vasiliev' via blink-dev wrote: > > Friendly ping. > > On Wed, Feb 2, 2022 at 11:53 AM Chris Harrelson <chris...@chromium.org> > wrote: > >> LGTM2 >> >> My understanding is that there is a security/privacy review ongoing to >> double-check this feature, so if there is an LGTM3 please make sure that >> review has concluded as well. >> >> On Wed, Feb 2, 2022 at 3:28 AM Yoav Weiss <yoavwe...@chromium.org> wrote: >> >>> LGTM1 >>> >>> On Thursday, January 20, 2022 at 7:08:59 AM UTC+1 Victor Vasiliev wrote: >>> >>>> Contact emails >>>> >>>> yhir...@chromium.org, vasi...@chromium.org >>>> >>>> Explainer >>>> >>>> https://github.com/w3c/webtransport/blob/main/explainer.md >>>> >>>> Spec >>>> >>>> >>>> https://w3c.github.io/webtransport/#dom-webtransportoptions-servercertificatehashes >>>> >>>> WebTransport has been already covered by a series of TAG reviews (389 >>>> <https://github.com/w3ctag/design-reviews/issues/389>, 669 >>>> <https://github.com/w3ctag/design-reviews/issues/669>). >>>> >>>> Summary >>>> >>>> In WebTransport, the serverCertificateHashes option allows the website >>>> to connect to a WebTransport server by authenticating the certificate >>>> against the expected certificate hash instead of using the Web PKI. This >>>> feature allows Web developers to connect to WebTransport servers that would >>>> normally find obtaining a publicly trusted certificate challenging, such as >>>> hosts that are not publically routable, or virtual machines that are >>>> ephemeral in nature. >>>> >>>> During the WebTransport Intent to Ship email thread >>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/kwC5wES3I4c>, >>>> concerns were raised regarding the security considerations of this portion >>>> of the spec being incomplete. We believe that we have addressed those >>>> concerns (notably, in this PR >>>> <https://github.com/w3c/webtransport/pull/375>). >>>> >>> >>> Please followup on the PR to ensure it lands. Thanks! :) >>> >>> >>>> In terms of the actual code behavior, the only major difference since >>>> the previous thread is that we no longer allow RSA keys for the >>>> certificates. >>>> >>>> Link to “Intent to Prototype” blink-dev discussion >>>> >>>> >>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/I6MS2kOKcx0/m/NAdg7Sc-CwAJ >>>> >>>> Is this feature supported on all six Blink platforms (Windows, Mac, >>>> Linux, Chrome OS, Android, and Android WebView)? >>>> >>>> Yes. >>>> >>>> Debuggability >>>> >>>> The certificate-related errors for WebTransport sessions are logged >>>> into the developer console. >>>> >>>> Measurement >>>> >>>> The use of this feature is tracked by the >>>> WebTransportServerCertificateHashes use counter. >>>> >>>> Risks >>>> >>>> Interoperability and Compatibility >>>> >>>> There is some discussion about adding a mechanism to prevent websites >>>> from using this feature via an HTTP header (either CSP or a new header). >>>> Some of the proposals could potentially break existing usage under certain >>>> conditions (e.g. if a webpage both uses serverCertificateHashes and has a >>>> connect-src directive, and we decide to extend connect-src); I expect for >>>> those cases to be sufficiently niche to ultimately not be a problem, and >>>> the question itself is of fairly low priority as there does not seem to be >>>> a strong security reason for a website to restrict serverCertificateHashes. >>>> >>> >>> Are you planning to file a separate intent once those plans materialize? >>> >>> >>>> >>>> Gecko: worth prototyping >>>> <https://github.com/mozilla/standards-positions/issues/167#issuecomment-1015951396> >>>> >>>> WebKit: no signal >>>> <https://lists.webkit.org/pipermail/webkit-dev/2021-September/031980.html> >>>> >>>> Web / Framework developers: positive (we have received indication in >>>> the past that serverCertificateHashes is a blocker for migrating from >>>> WebRTC at least one of them) >>>> >>>> Ergonomics >>>> >>>> The API is roughly modeled after a similar WebRTC API >>>> (RtcDtlsFingerprint), with a noted improvement that the certificate hash no >>>> longer requires to be serialized into a specific format. >>>> >>>> Activation >>>> >>>> Using this feature would require web developers to design their >>>> application in a way that supports generating and distributing ephemeral >>>> certificates on demand. >>>> >>>> Security >>>> >>>> Security considerations for this feature are discussed at length in PR >>>> #375 >>>> <https://pr-preview.s3.amazonaws.com/vasilvv/web-transport/pull/375.html#certificate-hashes> >>>> . >>>> >>>> Is this feature fully tested by web-platform-tests >>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>? >>>> Link to test suite results from wpt.fyi. >>>> >>>> WebTransport itself is tested by web-platform-tests; this specific >>>> feature requires infra support that is currently not available (issue >>>> <https://github.com/web-platform-tests/wpt/issues/32463>). >>>> >>>> Entry on the feature dashboard <http://www.chromestatus.com/> >>>> >>>> https://chromestatus.com/feature/5690646332440576 >>>> >>> -- >>> You received this message because you are subscribed to the Google >>> Groups "blink-dev" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to blink-dev+unsubscr...@chromium.org. >>> To view this discussion on the web visit >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/2a591c7e-ef31-4015-8b34-256e12bcfce3n%40chromium.org >>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/2a591c7e-ef31-4015-8b34-256e12bcfce3n%40chromium.org?utm_medium=email&utm_source=footer> >>> . >>> >> -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAZdMaetk7JoQ-gOmhcPKgRh2uo%2BnKNeG%3DYOF%3Dnrat0YVPUgBQ%40mail.gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAZdMaetk7JoQ-gOmhcPKgRh2uo%2BnKNeG%3DYOF%3Dnrat0YVPUgBQ%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > > -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/546df1df-f975-85d1-ff9b-b59eadeab4a8%40gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/546df1df-f975-85d1-ff9b-b59eadeab4a8%40gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJUhtG9DD%3DkaNAPHj3z_pJ9%3Dp-6bfYqHzUtib-%2BOQqNhhT3tDg%40mail.gmail.com.