On Wed, Mar 29, 2023 at 10:32 AM Javier Garcia Visiedo <visi...@chromium.org>
wrote:

> Thank you for your quick reply Yoav,
>
> Please find my answers inline.
>
>
> On Wednesday, March 29, 2023 at 4:35:32 PM UTC+9 Yoav Weiss wrote:
>
> Thank you so much, Javier! :) That's some great analysis!
>
> On Wed, Mar 29, 2023 at 7:51 AM Javier Garcia Visiedo <
> visi...@chromium.org> wrote:
>
> Hi all,
>
> Please find the summary of my findings, after analyzing the UKM data.
>
> Currently, the UKM data shows 2,087 distinct domains (eTLD+1) sending a
> wildcard for ACAH and/or ACAO in response to a credentialled request. The
> UKM data is not good at showing events over time, but the use counter
> <https://chromestatus.com/metrics/feature/timeline/popularity/3873>
> indicates the feature use is currently at 0.12% of total page loads, and
> the monthly average of page loads has been steadily increasing since the
> introduction of the use counter.
>
> Out of the 2,087 domains found in the UKM, the top one accounts for 39.24%
> of the total navigations in the UKM (54% within top 20 sites), using this
> feature. The user experience is not visibly impacted for this site, as CORS
> is blocking calls to a publisher.Ads are displayed properly, so apparently
> the blocked calls are impacting some kind of targeted ads API. This site
> came into the data set for the first time in March 2023, and it’s very
> popular, so we expect to observe a big bump on the use counter from now on.
> This site is an outlier in terms of traffic volume, compared to other sites
> present in the UKM, and given the lack of Ux impact we decided to exclude
> it from the analysis presented below, to get a better representation for
> the rest of the sites.
>
> Excluding the top site, we tested the next top 20 domains in number of
> navigations using this feature, accounting for 42% of the total navigation
> in the UKM. In addition to this, we sampled the long tail for 11 more sites
> randomly, for an additional 3,4% of the total navigation in the UKM.
>
> Extrapolating data from the sampling, we classified sites in the following
> categories:
>
>    -
>
>    No Ux impact: 94.85% of the navigations are free from visible user
>    experience impacts. In most cases, CORS policy is blocking calls to
>    personalization or analytics APIs.
>
>
> "CORS policy" here refers to the status quo before this feature ships?
>
>
> No, these calls are blocked when activating the feature
>

Oh, ok. So these may have invisible breakage, that results in some
ancillary service failure, but that users are unlikely to notice.


>
>
>
>
>
>    -
>
>    Impact to critical functionality, overall experience, log-in, etc.:
>    2.6%
>    -
>
>    Impact to ancillary elements being blocked by CORS policy, such as ads
>    or widgets not essential to the overall page functionality: 2.55%
>
> Putting these numbers in context of the total page loads reported by the
> use counter, 0,0062% of the total page loads experience some UX regression
> due to the introduction of this feature. Of these, 0,0031% was unusable.
>
> We reached out to the site owners with Ux impacts, and we were able to
> confirm that 100% of the sites identified to have critical impact have
> already migrated out of this feature.
>
> That's a bit higher than what we're typically comfortable with, but it's
> great to hear that sites you reach out to react quickly.
> How much of that impact was in the top 20 (where we can reasonably reach
> out) vs. the long tail (where it'd be significantly harder to communicate
> things beyond deprecation logs and reports)?
>
>
> For sites with high impact (already addressed) 100% were found in the top
> 20.
>

That's very reassuring, thanks!


> For sites where some visual elements are blocked, 55% (1.48% of total
> navigations registered in the UKM for this feature) are part of the top 20,
> 45% in the long tail, with 1.07% of total navigations in the UKM.
>
>
> Happy to further clarify the data if needed.
>
> Thanks
> Javier
>
> On Wednesday, July 13, 2022 at 2:49:30 PM UTC+9 Yoav Weiss wrote:
>
> Hey Javier!
>
> The benefits of UKM is that it can give us a list of URLs that have some
> breakage potential. The laternative is to cross the usecounter with
> HTTPArchive data, but that has a strong bias towards homepages, so may miss
> a lot of pages that require a login and are not the homepage. With a more
> accurate list of URLs, we'd be able to better assess the usage and
> potential breakage.
>
> Cheers :)
> Yoav
>
> On Wed, Jul 13, 2022 at 3:52 AM Javier Garcia Visiedo <
> visi...@chromium.org> wrote:
>
> Hi,
> I am starting a UKM collection review to opt in the existing use counter
> <https://chromestatus.com/metrics/feature/timeline/popularity/3873> into
> an UKM. Sorry if my question is too naive, I just wanted to understand what
> benefits would the UKM add over the existing use counter? Or is it the
> intention to add additional metrics to it? Thanks!
> Cheers
> Javier
>
>
> On Thursday, January 27, 2022 at 1:33:19 AM UTC+9 Chris Harrelson wrote:
>
> Hi, just checking in on this intent. From the API owners' perspective,
> we're going to wait for the UKM, thanks.
>
> On Wed, Jan 12, 2022 at 7:41 AM Yutaka Hirano <yhir...@chromium.org>
> wrote:
>
> Hi Yoav,
>
> Thank you for the suggestions. I'll try to add UKM.
>
> > One other question that came up: Is the usage related to developers
> adding the "Authorization" header on their own, or is it something the
> browser sends under certain circumstances? (e.g. when receiving 401
> responses with "WWW-Autenticate" headers)
>
> This is only for authorization headers set by scripts (via fetch() and
> XHR). Authorization headers the browser attaches are out of scope.
>
> On Thu, Jan 6, 2022 at 2:15 AM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
> Hey Yutaka!
>
> We discussed this at the API owners meeting today (Daniel, Chris, Alex,
> MikeT and myself).
> It seems like the risk here is too high to remove support as is, and a
> reasonable next step may be to add the metric to UKM and get a more
> detailed view of which sites are using it and how. That would enable us to
> better assess breakage, and reach out to those sites to reduce current
> usage until potential breakage reaches acceptable levels.
>
> One other question that came up: Is the usage related to developers adding
> the "Authorization" header on their own, or is it something the browser
> sends under certain circumstances? (e.g. when receiving 401 responses with
> "WWW-Autenticate" headers)
> Would renaming the headers used in such authentication protocols be a
> useful alternative to consider? I'm guessing that doing that would require
> server changes as well, so won't necessarily help with cases of existing
> content, but may help to move newer auth flows to make safer CORS choices.
>
> Cheers :)
> Yoav
>
> On Thursday, December 9, 2021 at 12:17:40 PM UTC+1 Yutaka Hirano wrote:
>
> We've been showing a deprecation message since 94
> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>.
> Sadly the deprecation message hasn't decreased the usage so far.
>
> On Thu, Dec 9, 2021 at 1:52 AM Mike West <mk...@chromium.org> wrote:
>
> From my perspective, it's a bit worrying that you found user-visible
> breakage in a random sampling of the otherwise small number of sites that
> fall into this category. As Yoav suggested, there's some additional
> likelihood that we're not seeing some breakage that requires sign-in. It
> might be worthwhile to raise a deprecation warning for this behavior, and
> remove it after giving developers some time to adjust, perhaps with an
> enterprise policy for good measure. I'd be happy with a 3-release timeline,
> with removal thereafter. That might drive the usage down to the point where
> we can reasonably remove it. If it doesn't, we might need to do some more
> research (wiring this counter up to UKM, for instance) to see if we can
> track down more clear sources of potential breakage.
>
> -mike
>
> On Thursday, December 2, 2021 at 6:56:40 AM UTC+1 Yutaka Hirano wrote:
>
> On Thu, Dec 2, 2021 at 12:29 AM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
>
>
> On Wed, Dec 1, 2021 at 4:00 PM Yutaka Hirano <yhir...@chromium.org> wrote:
>
> Sorry for the delay!
>
> I checked 10 sites. I saw console errors in three sites among them:
>  1. https://cchatty.com/
>  2. https://techrxiv.org/
>  3. https://bodyshake.com/
>
> I only see a visible breakage in 1 (cards in the main panel are
> invisible). On other sites I don't see any visible differences.
> Please note that this feature is related to authorization so it is likely
> to break things when signing in.
>
>
> So it's possible that the breakage only occurs for logged in users, and is
> not something you'd be able to see when spot checking their homepage?
>
>
> Yeah, I think so.
>
>
>
>
>
> On Wed, Dec 1, 2021 at 8:11 PM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
> Friendly ping on Chris' question
>
> On Thursday, November 4, 2021 at 8:31:36 PM UTC+1 Chris Harrelson wrote:
>
> Would it be feasible to get a random list of 10-20 sites that hit the use
> counter and see if they are broken badly by this feature?
>
> On Thu, Nov 4, 2021 at 4:54 AM Yutaka Hirano <yhir...@chromium.org> wrote:
>
> (friendly ping)
>
> On Mon, Nov 1, 2021 at 1:57 PM Yutaka Hirano <yhir...@chromium.org> wrote:
>
> Thank you for the feedback.
>
> Do you have concrete steps for the investigation in your mind?
>
> On Fri, Oct 29, 2021 at 4:30 AM Mike West <mk...@chromium.org> wrote:
>
> I think it's reasonable for us to dig into the data a little bit to
> determine whether the 0.04% number quoted above will result in user-facing
> breakage. Yutaka, is that something you'd be willing to dig into?
>
> The direction seems philosophically correct to me, so I'd like to see it
> ship, but I'd also like to make sure we're not making the web worse for
> users by doing so.
>
> -mike
>
>
> On Thu, Oct 21, 2021 at 12:04 PM Yutaka Hirano <yhir...@chromium.org>
> wrote:
>
>
>
> On Thu, Oct 21, 2021 at 6:25 PM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
>
>
> On Thu, Oct 21, 2021 at 9:55 AM Yutaka Hirano <yhir...@chromium.org>
> wrote:
>
> (The implementation CL
> <https://chromium-review.googlesource.com/c/chromium/src/+/3226283> is
> under review. This intent is written as if it's landed.)
>
> Contact emailsyhir...@chromium.org
>
> Specificationhttps://fetch.spec.whatwg.org/#cors-non-wildcard-request-
> header-name
>
> Summary
>
> A CORS non-wildcard request header[1] is an HTTP request header which is
> not covered by the wildcard symbol ("*") in the
> access-control-allow-headers header. "authorization" is the only member of
> CORS non-wildcard request-header. Currently we treat the header as a usual
> header, which is problematic for security reasons. Implement it, and change
> the current behavior. 1: https://fetch.spec.whatwg.org/
> #cors-non-wildcard-request-header-name
>
>
> Blink componentBlink>SecurityFeature>CORS
> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS>
>
> TAG reviewNot needed because this implements an existing feature.
>
> TAG review statusNot applicable
>
> Risks
>
>
> Interoperability and Compatibility
>
> Interoperability risk is low because Mozilla and Apple showed an intent to
> implement this behavior. There is some compatibility risk, as the use
> counter[2] shows 0.04% websites would be affected. To mitigate the risk,
> we've shown a deprecation message for a few milestones.
>
>
> Can you similarly send deprecation reports as well? How long have the
> deprecation messages been in place? Did we see any decline in the numbers?
>
> We've shown the deprecation message since Chrome 94
> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>
>  whose
> beta promotion was on Aug 26 and stable release was on Sep 21.
> We use CountDeprecation which sends deprecation reports automatically IIUC.
>
> I don't see any decline.
>
>
> Have we looked into which URLs are triggering this? (and if it's a few
> medium-sized properties or many tiny ones)
>
>
> I haven't looked at the data.
>
> Did we try outreach?
>
> No.
>
>
> We have an enterprise policy so that administrators can keep the existing
> behavior. We're planning to remove the policy on Chrome 103. 2:
> https://www.chromestatus.com/metrics/feature/popularity#
> AuthorizationCoveredByWildcard
>
>
> Gecko: Positive Firefox showed a positive signal in a private thread.
>
> WebKit: Positive Apple showed a positive signal in a private thread.
>
> Web developers: No signals
>
>
> Debuggability
>
> We'll show a CORS error to the devtools console.
>
>
> Is this feature fully tested by web-platform-tests
> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
> ?Yes
>
> Flag nameCorsNonWildcardRequestHeadersSupport
>
> Requires code in //chrome?False (or, True only for the enterprise policy.)
>
> Tracking bughttps://crbug.com/1176753
>
> Estimated milestones
>
> 97
>
> Link to entry on the Chrome Platform Statushttps://chromestatus.com/
> feature/5742041264816128
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%
> 3DMUkX0DED7yWbL4JfGg%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%3DMUkX0DED7yWbL4JfGg%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-
> O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
>
> To view this discussion on the web visit https://groups.google.com/a/
> chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%
> 3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfUS_DDkFYbtyF2gFh8hFOWXaqSq_Y9UEimSnR8ZYm6QAQ%40mail.gmail.com.

Reply via email to