On Wed, Mar 29, 2023 at 11:01 AM Yoav Weiss <yoavwe...@chromium.org> wrote:

>
>
> On Wed, Mar 29, 2023 at 10:32 AM Javier Garcia Visiedo <
> visi...@chromium.org> wrote:
>
>> Thank you for your quick reply Yoav,
>>
>> Please find my answers inline.
>>
>>
>> On Wednesday, March 29, 2023 at 4:35:32 PM UTC+9 Yoav Weiss wrote:
>>
>> Thank you so much, Javier! :) That's some great analysis!
>>
>> On Wed, Mar 29, 2023 at 7:51 AM Javier Garcia Visiedo <
>> visi...@chromium.org> wrote:
>>
>> Hi all,
>>
>> Please find the summary of my findings, after analyzing the UKM data.
>>
>> Currently, the UKM data shows 2,087 distinct domains (eTLD+1) sending a
>> wildcard for ACAH and/or ACAO in response to a credentialled request. The
>> UKM data is not good at showing events over time, but the use counter
>> <https://chromestatus.com/metrics/feature/timeline/popularity/3873>
>> indicates the feature use is currently at 0.12% of total page loads, and
>> the monthly average of page loads has been steadily increasing since the
>> introduction of the use counter.
>>
>> Out of the 2,087 domains found in the UKM, the top one accounts for
>> 39.24% of the total navigations in the UKM (54% within top 20 sites), using
>> this feature. The user experience is not visibly impacted for this site, as
>> CORS is blocking calls to a publisher.Ads are displayed properly, so
>> apparently the blocked calls are impacting some kind of targeted ads API.
>> This site came into the data set for the first time in March 2023, and it’s
>> very popular, so we expect to observe a big bump on the use counter from
>> now on. This site is an outlier in terms of traffic volume, compared to
>> other sites present in the UKM, and given the lack of Ux impact we decided
>> to exclude it from the analysis presented below, to get a better
>> representation for the rest of the sites.
>>
>> Excluding the top site, we tested the next top 20 domains in number of
>> navigations using this feature, accounting for 42% of the total navigation
>> in the UKM. In addition to this, we sampled the long tail for 11 more sites
>> randomly, for an additional 3,4% of the total navigation in the UKM.
>>
>> Extrapolating data from the sampling, we classified sites in the
>> following categories:
>>
>>    -
>>
>>    No Ux impact: 94.85% of the navigations are free from visible user
>>    experience impacts. In most cases, CORS policy is blocking calls to
>>    personalization or analytics APIs.
>>
>>
>> "CORS policy" here refers to the status quo before this feature ships?
>>
>>
>> No, these calls are blocked when activating the feature
>>
>
> Oh, ok. So these may have invisible breakage, that results in some
> ancillary service failure, but that users are unlikely to notice.
>

>
>>
>>
>>
>>
>>
>>    -
>>
>>    Impact to critical functionality, overall experience, log-in, etc.:
>>    2.6%
>>    -
>>
>>    Impact to ancillary elements being blocked by CORS policy, such as
>>    ads or widgets not essential to the overall page functionality: 2.55%
>>
>> Putting these numbers in context of the total page loads reported by the
>> use counter, 0,0062% of the total page loads experience some UX regression
>> due to the introduction of this feature. Of these, 0,0031% was unusable.
>>
>> We reached out to the site owners with Ux impacts, and we were able to
>> confirm that 100% of the sites identified to have critical impact have
>> already migrated out of this feature.
>>
>> That's a bit higher than what we're typically comfortable with, but it's
>> great to hear that sites you reach out to react quickly.
>> How much of that impact was in the top 20 (where we can reasonably reach
>> out) vs. the long tail (where it'd be significantly harder to communicate
>> things beyond deprecation logs and reports)?
>>
>>
>> For sites with high impact (already addressed) 100% were found in the top
>> 20.
>>
>
> That's very reassuring, thanks!
>
>
>> For sites where some visual elements are blocked, 55% (1.48% of total
>> navigations registered in the UKM for this feature) are part of the top 20,
>> 45% in the long tail, with 1.07% of total navigations in the UKM.
>>
>
For these visual elements, are there any common threads that you could
notice? E.g. Any common 3P providers?
I guess the same question also applies to the non-visual breakage. (you
mentioned analytics and personalization providers)



>
>>
>> Happy to further clarify the data if needed.
>>
>> Thanks
>> Javier
>>
>> On Wednesday, July 13, 2022 at 2:49:30 PM UTC+9 Yoav Weiss wrote:
>>
>> Hey Javier!
>>
>> The benefits of UKM is that it can give us a list of URLs that have some
>> breakage potential. The laternative is to cross the usecounter with
>> HTTPArchive data, but that has a strong bias towards homepages, so may miss
>> a lot of pages that require a login and are not the homepage. With a more
>> accurate list of URLs, we'd be able to better assess the usage and
>> potential breakage.
>>
>> Cheers :)
>> Yoav
>>
>> On Wed, Jul 13, 2022 at 3:52 AM Javier Garcia Visiedo <
>> visi...@chromium.org> wrote:
>>
>> Hi,
>> I am starting a UKM collection review to opt in the existing use counter
>> <https://chromestatus.com/metrics/feature/timeline/popularity/3873> into
>> an UKM. Sorry if my question is too naive, I just wanted to understand what
>> benefits would the UKM add over the existing use counter? Or is it the
>> intention to add additional metrics to it? Thanks!
>> Cheers
>> Javier
>>
>>
>> On Thursday, January 27, 2022 at 1:33:19 AM UTC+9 Chris Harrelson wrote:
>>
>> Hi, just checking in on this intent. From the API owners' perspective,
>> we're going to wait for the UKM, thanks.
>>
>> On Wed, Jan 12, 2022 at 7:41 AM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>> Hi Yoav,
>>
>> Thank you for the suggestions. I'll try to add UKM.
>>
>> > One other question that came up: Is the usage related to developers
>> adding the "Authorization" header on their own, or is it something the
>> browser sends under certain circumstances? (e.g. when receiving 401
>> responses with "WWW-Autenticate" headers)
>>
>> This is only for authorization headers set by scripts (via fetch() and
>> XHR). Authorization headers the browser attaches are out of scope.
>>
>> On Thu, Jan 6, 2022 at 2:15 AM Yoav Weiss <yoavwe...@chromium.org> wrote:
>>
>> Hey Yutaka!
>>
>> We discussed this at the API owners meeting today (Daniel, Chris, Alex,
>> MikeT and myself).
>> It seems like the risk here is too high to remove support as is, and a
>> reasonable next step may be to add the metric to UKM and get a more
>> detailed view of which sites are using it and how. That would enable us to
>> better assess breakage, and reach out to those sites to reduce current
>> usage until potential breakage reaches acceptable levels.
>>
>> One other question that came up: Is the usage related to developers
>> adding the "Authorization" header on their own, or is it something the
>> browser sends under certain circumstances? (e.g. when receiving 401
>> responses with "WWW-Autenticate" headers)
>> Would renaming the headers used in such authentication protocols be a
>> useful alternative to consider? I'm guessing that doing that would require
>> server changes as well, so won't necessarily help with cases of existing
>> content, but may help to move newer auth flows to make safer CORS choices.
>>
>> Cheers :)
>> Yoav
>>
>> On Thursday, December 9, 2021 at 12:17:40 PM UTC+1 Yutaka Hirano wrote:
>>
>> We've been showing a deprecation message since 94
>> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>.
>> Sadly the deprecation message hasn't decreased the usage so far.
>>
>> On Thu, Dec 9, 2021 at 1:52 AM Mike West <mk...@chromium.org> wrote:
>>
>> From my perspective, it's a bit worrying that you found user-visible
>> breakage in a random sampling of the otherwise small number of sites that
>> fall into this category. As Yoav suggested, there's some additional
>> likelihood that we're not seeing some breakage that requires sign-in. It
>> might be worthwhile to raise a deprecation warning for this behavior, and
>> remove it after giving developers some time to adjust, perhaps with an
>> enterprise policy for good measure. I'd be happy with a 3-release timeline,
>> with removal thereafter. That might drive the usage down to the point where
>> we can reasonably remove it. If it doesn't, we might need to do some more
>> research (wiring this counter up to UKM, for instance) to see if we can
>> track down more clear sources of potential breakage.
>>
>> -mike
>>
>> On Thursday, December 2, 2021 at 6:56:40 AM UTC+1 Yutaka Hirano wrote:
>>
>> On Thu, Dec 2, 2021 at 12:29 AM Yoav Weiss <yoavwe...@chromium.org>
>> wrote:
>>
>>
>>
>> On Wed, Dec 1, 2021 at 4:00 PM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>> Sorry for the delay!
>>
>> I checked 10 sites. I saw console errors in three sites among them:
>>  1. https://cchatty.com/
>>  2. https://techrxiv.org/
>>  3. https://bodyshake.com/
>>
>> I only see a visible breakage in 1 (cards in the main panel are
>> invisible). On other sites I don't see any visible differences.
>> Please note that this feature is related to authorization so it is likely
>> to break things when signing in.
>>
>>
>> So it's possible that the breakage only occurs for logged in users, and
>> is not something you'd be able to see when spot checking their homepage?
>>
>>
>> Yeah, I think so.
>>
>>
>>
>>
>>
>> On Wed, Dec 1, 2021 at 8:11 PM Yoav Weiss <yoavwe...@chromium.org> wrote:
>>
>> Friendly ping on Chris' question
>>
>> On Thursday, November 4, 2021 at 8:31:36 PM UTC+1 Chris Harrelson wrote:
>>
>> Would it be feasible to get a random list of 10-20 sites that hit the use
>> counter and see if they are broken badly by this feature?
>>
>> On Thu, Nov 4, 2021 at 4:54 AM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>> (friendly ping)
>>
>> On Mon, Nov 1, 2021 at 1:57 PM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>> Thank you for the feedback.
>>
>> Do you have concrete steps for the investigation in your mind?
>>
>> On Fri, Oct 29, 2021 at 4:30 AM Mike West <mk...@chromium.org> wrote:
>>
>> I think it's reasonable for us to dig into the data a little bit to
>> determine whether the 0.04% number quoted above will result in user-facing
>> breakage. Yutaka, is that something you'd be willing to dig into?
>>
>> The direction seems philosophically correct to me, so I'd like to see it
>> ship, but I'd also like to make sure we're not making the web worse for
>> users by doing so.
>>
>> -mike
>>
>>
>> On Thu, Oct 21, 2021 at 12:04 PM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>>
>>
>> On Thu, Oct 21, 2021 at 6:25 PM Yoav Weiss <yoavwe...@chromium.org>
>> wrote:
>>
>>
>>
>> On Thu, Oct 21, 2021 at 9:55 AM Yutaka Hirano <yhir...@chromium.org>
>> wrote:
>>
>> (The implementation CL
>> <https://chromium-review.googlesource.com/c/chromium/src/+/3226283> is
>> under review. This intent is written as if it's landed.)
>>
>> Contact emailsyhir...@chromium.org
>>
>> Specificationhttps://fetch.spec.whatwg.org/#cors-non-wildcard-request-
>> header-name
>>
>> Summary
>>
>> A CORS non-wildcard request header[1] is an HTTP request header which is
>> not covered by the wildcard symbol ("*") in the
>> access-control-allow-headers header. "authorization" is the only member of
>> CORS non-wildcard request-header. Currently we treat the header as a usual
>> header, which is problematic for security reasons. Implement it, and change
>> the current behavior. 1: https://fetch.spec.whatwg.org/
>> #cors-non-wildcard-request-header-name
>>
>>
>> Blink componentBlink>SecurityFeature>CORS
>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS>
>>
>> TAG reviewNot needed because this implements an existing feature.
>>
>> TAG review statusNot applicable
>>
>> Risks
>>
>>
>> Interoperability and Compatibility
>>
>> Interoperability risk is low because Mozilla and Apple showed an intent
>> to implement this behavior. There is some compatibility risk, as the use
>> counter[2] shows 0.04% websites would be affected. To mitigate the risk,
>> we've shown a deprecation message for a few milestones.
>>
>>
>> Can you similarly send deprecation reports as well? How long have the
>> deprecation messages been in place? Did we see any decline in the numbers?
>>
>> We've shown the deprecation message since Chrome 94
>> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>
>>  whose
>> beta promotion was on Aug 26 and stable release was on Sep 21.
>> We use CountDeprecation which sends deprecation reports automatically
>> IIUC.
>>
>> I don't see any decline.
>>
>>
>> Have we looked into which URLs are triggering this? (and if it's a few
>> medium-sized properties or many tiny ones)
>>
>>
>> I haven't looked at the data.
>>
>> Did we try outreach?
>>
>> No.
>>
>>
>> We have an enterprise policy so that administrators can keep the existing
>> behavior. We're planning to remove the policy on Chrome 103. 2:
>> https://www.chromestatus.com/metrics/feature/popularity#
>> AuthorizationCoveredByWildcard
>>
>>
>> Gecko: Positive Firefox showed a positive signal in a private thread.
>>
>> WebKit: Positive Apple showed a positive signal in a private thread.
>>
>> Web developers: No signals
>>
>>
>> Debuggability
>>
>> We'll show a CORS error to the devtools console.
>>
>>
>> Is this feature fully tested by web-platform-tests
>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>> ?Yes
>>
>> Flag nameCorsNonWildcardRequestHeadersSupport
>>
>> Requires code in //chrome?False (or, True only for the enterprise
>> policy.)
>>
>> Tracking bughttps://crbug.com/1176753
>>
>> Estimated milestones
>>
>> 97
>>
>> Link to entry on the Chrome Platform Statushttps://chromestatus.com/
>> feature/5742041264816128
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit https://groups.google.com/a/
>> chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%
>> 3DMUkX0DED7yWbL4JfGg%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%3DMUkX0DED7yWbL4JfGg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit https://groups.google.com/a/
>> chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-
>> O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>>
>> To view this discussion on the web visit https://groups.google.com/a/
>> chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%
>> 3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfUKG0v5o0LdwiS_uQBsbJ4%2BMO02iKvYKnj-s5SAJMWSPg%40mail.gmail.com.

Reply via email to