Some reports can be found here as well: https://bugs.chromium.org/p/chromium/issues/list?q=ERR_SSL_PROTOCOL_ERROR&can=2
On Wednesday, September 27, 2023 at 6:04:54 PM UTC+1 David Benjamin wrote: > Yup, it's finch-gated. (Finch feature name in the original email.) > > > On Wed, Sep 27, 2023, 11:11 Daniel Bratell <brat...@gmail.com> wrote: > >> LGTM2 (for the original request, just to be clear) >> >> I assume it will have the normal flag that will allow it to be turned off >> if our interpretation is incorrect, since it is so hard to measure with a >> high accuracy. >> >> /Daniel >> On 2023-09-26 18:33, David Benjamin wrote: >> >> To clarify, I meant that we should apply this to WebRTC *in a >> separate launch*. This one will just be HTTPS. We don't have numbers or >> a flag for WebRTC right now, and we usually end up doing WebRTC separately >> anyway, for better or worse. :-) >> >> On Tue, Sep 26, 2023 at 12:31 PM David Benjamin <davi...@chromium.org> >> wrote: >> >>> Ah yeah, we should apply this to WebRTC too. Based on the kinds of >>> issues we've seen, hopefully that one will be easy (I wouldn't expect >>> WebRTC to be impacted by the kinds of server bugs we've seen), but >>> certainly we'll need numbers. >>> >>> Measurement is a little complicated for HTTPS (we had to do this >>> fallback dance to avoid a ton of false positives on old Schannel behavior, >>> which is why we had to pick up transient network errors as a different >>> source of false positives). But since WebRTC talks to different kinds of >>> peers, I suspect you all can just histogram the server-selected algorithm >>> with SSL_get_peer_signature_algorithm, and just assume that's an accurate >>> enough predictor. (TLS is client-offer / server-select, so we never learn >>> the server's full capabilities, only what it happened to pick in response >>> to our ClientHello. This makes measurements inherently more complex >>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/RShdgyaDoX4/m/ly5-WQEBBgAJ> >>> >>> than measuring JavaScript API usage, but in simple cases just measuring >>> the server selection gives good enough numbers.) >>> >>> On Tue, Sep 26, 2023 at 5:26 AM Philipp Hancke < >>> philipp...@googlemail.com> wrote: >>> >>>> Should/can this also be applied to WebRTC's DTLS connections? >>>> >>>> (we don't have numbers but that can be fixed) >>>> >>>> Am Mo., 25. Sept. 2023 um 19:13 Uhr schrieb Yoav Weiss < >>>> yoav...@chromium.org>: >>>> >>>>> LGTM1 to remove support, given that 0.009% of TLS connections divided >>>>> by ~30 is roughly at our typical threshold. Also given the dominance of >>>>> subresource TLS connections, it's likely that breakage would hit one of >>>>> those subresources, making it less likely to cause functional damage >>>>> (compared to e.g. the navigation request TLS connection). >>>>> >>>>> On Mon, Sep 25, 2023 at 6:03 PM David Adrian <dad...@google.com> >>>>> wrote: >>>>> >>>>>> There are approximately 30x TLS connections relative to pageloads, >>>>>> due to subresources. Once you have a TLS connection open for a main >>>>>> frame, >>>>>> I'm not sure how many page loads happen across it. Probably a lot, but >>>>>> it's >>>>>> still dominated by subresources. >>>>>> >>>>>> In practice, the 0.02% bound appears to have shaken out to sub 0.01% >>>>>> (0.009%), determined by looking at differences in the "OK" result for >>>>>> Net.SSL_Connection_Error. >>>>>> >>>>>> On Tue, Sep 19, 2023 at 8:59 PM Yoav Weiss <yoav...@chromium.org> >>>>>> wrote: >>>>>> >>>>>>> >>>>>>> >>>>>>> On Wed, Sep 20, 2023 at 12:47 AM David Benjamin < >>>>>>> davi...@chromium.org> wrote: >>>>>>> >>>>>>>> On Tue, Sep 19, 2023 at 1:50 AM Yoav Weiss <yoav...@chromium.org> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> On Tue, Sep 19, 2023 at 7:45 AM Yoav Weiss <yoav...@chromium.org> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> On Tue, Sep 19, 2023 at 1:35 AM 'Jeffrey Yasskin' via blink-dev < >>>>>>>>>> blin...@chromium.org> wrote: >>>>>>>>>> >>>>>>>>>>> On Mon, Sep 18, 2023 at 4:11 PM David Adrian <dad...@google.com> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> > This should probably be an "Intent to Deprecate and Remove" >>>>>>>>>>>> rather than an "Intent to Ship". >>>>>>>>>>>> >>>>>>>>>>>> You're absolutely right that it should be, unfortunately that's >>>>>>>>>>>> not the subject Chrome Status generated. I'll file an issue. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Oops, yes, you did everything right here. There's already >>>>>>>>>>> https://github.com/GoogleChrome/chromium-dashboard/issues/2749 >>>>>>>>>>> about changing this subject line, and now >>>>>>>>>>> https://github.com/GoogleChrome/chromium-dashboard/issues/3346 >>>>>>>>>>> to align the Chrome Status UI with the launching-features page. >>>>>>>>>>> >>>>>>>>>>> > The RFC's introduction at >>>>>>>>>>>> https://www.rfc-editor.org/rfc/rfc9155.html#name-introduction >>>>>>>>>>>> is a pretty good explainer for why we should remove SHA-1 >>>>>>>>>>>> signatures. >>>>>>>>>>>> >>>>>>>>>>>> Agreed. Noting in general, there is a large process mismatch >>>>>>>>>>>> between TLS launches and the Blink launch process, as discussed in >>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/CmlXjQeNWDI/m/r-AUe0OqAQAJ. >>>>>>>>>>>> >>>>>>>>>>>> That's why this Intent looks a little different. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>> I wouldn't categorize it as a large process mismatch. But that's >>>>>>>>>> an orthogonal discussion. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>> As for the launch itself, I'll note it's been at 10% on Finch >>>>>>>>>>>> for a couple weeks and everything looks gray, so we should be safe >>>>>>>>>>>> to ramp >>>>>>>>>>>> up to 100%. The only thing of note was a correlation with an >>>>>>>>>>>> unrelated >>>>>>>>>>>> crash in Blink >>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/detail?id=1479083#c2>, >>>>>>>>>>>> >>>>>>>>>>>> since the deprecation rollout was fairly large. It only showed at >>>>>>>>>>>> 10%, not >>>>>>>>>>>> 1%. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>> How would we know of breakage in those 10%? Would that look like >>>>>>>>> users filing issues? Something else? >>>>>>>>> >>>>>>>>> >>>>>>>>>>>> On Mon, Sep 18, 2023 at 3:53 PM Jeffrey Yasskin < >>>>>>>>>>>> jyas...@google.com> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> This should probably be an "Intent to Deprecate and Remove" >>>>>>>>>>>>> <https://www.chromium.org/blink/launching-features/#feature-deprecations> >>>>>>>>>>>>> >>>>>>>>>>>>> rather than an "Intent to Ship". I'll let an API owner say if >>>>>>>>>>>>> there's a >>>>>>>>>>>>> reason to re-send it; probably there isn't. >>>>>>>>>>>>> >>>>>>>>>>>>> On Mon, Sep 18, 2023 at 3:47 PM 'David Adrian' via blink-dev < >>>>>>>>>>>>> blin...@chromium.org> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> Contact emails dad...@google.com >>>>>>>>>>>>>> >>>>>>>>>>>>>> Explainer None >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> The RFC's introduction at >>>>>>>>>>>>> https://www.rfc-editor.org/rfc/rfc9155.html#name-introduction >>>>>>>>>>>>> is a pretty good explainer for why we should remove SHA-1 >>>>>>>>>>>>> signatures. >>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>>> Specification https://www.rfc-editor.org/rfc/rfc9155.html >>>>>>>>>>>>>> >>>>>>>>>>>>>> Summary >>>>>>>>>>>>>> >>>>>>>>>>>>>> Chrome is removing support for signature algorithms using >>>>>>>>>>>>>> SHA-1 for server signatures during the TLS handshake. This does >>>>>>>>>>>>>> not affect >>>>>>>>>>>>>> SHA-1 support in server certificates, which was already removed, >>>>>>>>>>>>>> or in >>>>>>>>>>>>>> client certificates, which continues to be supported. SHA-1 can >>>>>>>>>>>>>> be >>>>>>>>>>>>>> temporarily re-enabled via the temporary >>>>>>>>>>>>>> InsecureHashesInTLSHandshakesEnabled enterprise policy. This >>>>>>>>>>>>>> policy will be >>>>>>>>>>>>>> removed in Chrome 123. >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Blink component Internals>Network>SSL >>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Search tags tls <https://chromestatus.com/features#tags:tls> >>>>>>>>>>>>>> , ssl <https://chromestatus.com/features#tags:ssl>, sha1 >>>>>>>>>>>>>> <https://chromestatus.com/features#tags:sha1> >>>>>>>>>>>>>> >>>>>>>>>>>>>> TAG review None >>>>>>>>>>>>>> >>>>>>>>>>>>>> TAG review status Not applicable >>>>>>>>>>>>>> >>>>>>>>>>>>>> Risks >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>>>> >>>>>>>>>>>>>> At most 0.02% of page loads use the SHA1 fallback. However, >>>>>>>>>>>>>> we cannot disambiguate between a flaky first connection, and >>>>>>>>>>>>>> actually >>>>>>>>>>>>>> requiring SHA1. We expect the actual amount is lower. >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>> Are we thinking that 0.02% is a loose upper bound? Is that >>>>>>>>>> correct? >>>>>>>>>> >>>>>>>>> >>>>>>>> As with anything in TLS, the protocol is client-offer / >>>>>>>> server-select, which means we pick up all the implications of that. We >>>>>>>> can >>>>>>>> measure what the server selects, but that doesn't actually tell us >>>>>>>> what >>>>>>>> will happen if we change the ClientHello: >>>>>>>> - Perhaps the server preferentially chooses SHA-1, but will pick >>>>>>>> SHA-2 if not offered. (I.e. SHA-1-preferring instead of >>>>>>>> SHA-1-requiring) >>>>>>>> - Perhaps the server picks SHA-2 regardless but, for some odd >>>>>>>> reason, breaks when SHA-1 is not offered. This could be a buggy, >>>>>>>> non-compliant fingerprinting script, or some weird behavior. >>>>>>>> >>>>>>>> Usually, these effects are small enough that we just measure the >>>>>>>> server selection and don't worry about it. Here, we could not do that. >>>>>>>> First, we knew from previously sampling sites that some servers (older >>>>>>>> IIS) >>>>>>>> fall in the first category. These servers would not break, but would >>>>>>>> seem >>>>>>>> to break if we measure the server selection. We also knew, again from >>>>>>>> sampling and due to the multiple places where this ClientHello field >>>>>>>> is >>>>>>>> used, the second category also shows up (in many cases, also older >>>>>>>> IIS). >>>>>>>> These servers would break but would seem not to if we measure the >>>>>>>> server >>>>>>>> selection. >>>>>>>> >>>>>>>> Thus, we used a different measurement strategy. We send a >>>>>>>> SHA-1-less ClientHello and then, on error, retry with SHA-1 restored. >>>>>>>> This >>>>>>>> does not work for security (an attacker can always force us onto the >>>>>>>> second >>>>>>>> round), but it helps counteract the above effects for a more accurate >>>>>>>> measurement... up to a point. Up to a point because, in exchange for >>>>>>>> clearing those effects, we pick a different effect: transient network >>>>>>>> errors will also trigger the retry. And thus our numbers inherently >>>>>>>> have >>>>>>>> noise at the scale of transient network errors. >>>>>>>> >>>>>>>> See also >>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/RShdgyaDoX4/m/ly5-WQEBBgAJ, >>>>>>>> >>>>>>>> where we previously discussed this same client-offer / server-select >>>>>>>> property. >>>>>>>> >>>>>>>> This is a difference from web platform things, where we can simply >>>>>>>> observe in Chrome what APIs the site uses and moves on. >>>>>>>> >>>>>>>> >>>>>>>>> Any way to sample a few sites to validate that assumption? >>>>>>>>>> >>>>>>>>> >>>>>>>> I'm not sure what you mean. Networks occasionally flake, so any >>>>>>>> kind of fallback measurements will capture some flakiness. Sampling >>>>>>>> sites >>>>>>>> won't tell us anything about that. >>>>>>>> >>>>>>> >>>>>>> For web platform features, where we have both usecounters in the >>>>>>> HTTPArchive and potentially UKM, we can gather potentially breaking >>>>>>> URLs/origins, grab a few dozens random names from the list and deep >>>>>>> dive >>>>>>> into them to see if they show breakage or not. >>>>>>> >>>>>>> I'm not sure that we have anything similar for the netstack, where >>>>>>> we could e.g. report the failures in ways that enable us to later >>>>>>> follow up >>>>>>> and run a similar manual check. (e.g. by reporting the failing DNS name >>>>>>> and/or IP) >>>>>>> >>>>>>> >>>>>>>> >>>>>>>> >>>>>>>>> Also, are those 0.02% driven by origins? Specific user platforms? >>>>>>>>> Something else? >>>>>>>>> >>>>>>>> >>>>>>>> This is 0.02% of TLS connections (sorry, page loads was a typo). >>>>>>>> >>>>>>> >>>>>>> OK, that seems better, as presumably the denominator is smaller then >>>>>>> it would be for page loads (which is what we typically use). Do you >>>>>>> have a >>>>>>> sense of the difference between denominators? (so, how many page loads >>>>>>> typically happen per TLS connection?) >>>>>>> >>>>>>> >>>>>>>> This is another of those differences between networking and web >>>>>>>> platform features. The denominator is unavoidably different because of >>>>>>>> where in the stack this logic applies. Where it is actually an >>>>>>>> incompatibility with a site, it will be based on the origin. This is >>>>>>>> almost >>>>>>>> always due to a bug in the server software because every TLS 1.2 >>>>>>>> implementations supports SHA-2. (E.g. very very old OpenSSLs, with >>>>>>>> several >>>>>>>> known, unrelated security vulnerabilities have a bug where, with some >>>>>>>> server software, mess this up.) >>>>>>>> >>>>>>>> Where it is a transient network error above it is, well, a >>>>>>>> transient network error and presumably driven by network conditions. >>>>>>>> >>>>>>>> >>>>>>>>> >>>>>>>>>>>>>> *Gecko*: Positive ( >>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/812) >>>>>>>>>>>>>> >>>>>>>>>>>>>> *WebKit*: Positive ( >>>>>>>>>>>>>> https://github.com/WebKit/standards-positions/issues/196) >>>>>>>>>>>>>> >>>>>>>>>>>>>> *Web developers*: No signals >>>>>>>>>>>>>> >>>>>>>>>>>>>> *Other signals*: >>>>>>>>>>>>>> >>>>>>>>>>>>>> WebView application risks >>>>>>>>>>>>>> >>>>>>>>>>>>>> Does this intent deprecate or change behavior of existing >>>>>>>>>>>>>> APIs, such that it has potentially high risk for Android >>>>>>>>>>>>>> WebView-based >>>>>>>>>>>>>> applications? >>>>>>>>>>>>>> >>>>>>>>>>>>>> None >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Debuggability >>>>>>>>>>>>>> >>>>>>>>>>>>>> n/a, this happens pre-devtools >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> Will this feature be supported on all six Blink platforms >>>>>>>>>>>>>> (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)? >>>>>>>>>>>>>> Yes >>>>>>>>>>>>>> >>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>>>>>>> ? No >>>>>>>>>>>>>> >>>>>>>>>>>>>> Flag name on chrome://flags use-sha1-server-handshakes >>>>>>>>>>>>>> >>>>>>>>>>>>>> Finch feature name DisableSHA1ServerSignature >>>>>>>>>>>>>> >>>>>>>>>>>>>> Requires code in //chrome? False >>>>>>>>>>>>>> >>>>>>>>>>>>>> Tracking bug >>>>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=658905 >>>>>>>>>>>>>> >>>>>>>>>>>>>> Launch bug https://launch.corp.google.com/launch/4233200 >>>>>>>>>>>>>> >>>>>>>>>>>>>> Estimated milestones >>>>>>>>>>>>>> Shipping on desktop 117 >>>>>>>>>>>>>> OriginTrial desktop last 116 >>>>>>>>>>>>>> OriginTrial desktop first 115 >>>>>>>>>>>>>> DevTrial on desktop 115 >>>>>>>>>>>>>> Shipping on Android 117 >>>>>>>>>>>>>> OriginTrial Android last 116 >>>>>>>>>>>>>> OriginTrial Android first 115 >>>>>>>>>>>>>> DevTrial on Android 115 >>>>>>>>>>>>>> OriginTrial webView last 116 >>>>>>>>>>>>>> OriginTrial webView first 115 >>>>>>>>>>>>>> >>>>>>>>>>>>>> Anticipated spec changes >>>>>>>>>>>>>> >>>>>>>>>>>>>> Open questions about a feature may be a source of future web >>>>>>>>>>>>>> compat or interop issues. Please list open issues (e.g. links to >>>>>>>>>>>>>> known >>>>>>>>>>>>>> github issues in the project for the feature specification) >>>>>>>>>>>>>> whose >>>>>>>>>>>>>> resolution may introduce web compat/interop risk (e.g., changing >>>>>>>>>>>>>> to naming >>>>>>>>>>>>>> or structure of the API in a non-backward-compatible way). >>>>>>>>>>>>>> None >>>>>>>>>>>>>> >>>>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>>>> https://chromestatus.com/feature/4832850040324096 >>>>>>>>>>>>>> >>>>>>>>>>>>>> Links to previous Intent discussions Intent to Experiment: >>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42JZz%3De_TRVwumqgTj-A7543BR7JLBUR_GzVN_oOWhKVvg%40mail.gmail.com >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>>>>>>>> <https://chromestatus.com/>. >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>>>> it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42LiSGgfN1trVXfrmCW0Upk9r9GK4XYZQm5Y8RSzphn_DA%40mail.gmail.com >>>>>>>>>>>>>> >>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAGkh42LiSGgfN1trVXfrmCW0Upk9r9GK4XYZQm5Y8RSzphn_DA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>> . >>>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>> it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANh-dXnM7SzAOh2y6hcuezDpo-yCW%3DtNg0%3D1ErEMCFN%3DSSpsQQ%40mail.gmail.com >>>>>>>>>>> >>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CANh-dXnM7SzAOh2y6hcuezDpo-yCW%3DtNg0%3D1ErEMCFN%3DSSpsQQ%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>> . >>>>>>>>>>> >>>>>>>>>> -- >>>>>>>>> You received this message because you are subscribed to the Google >>>>>>>>> Groups "blink-dev" group. >>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>> send an email to blink-dev+...@chromium.org. >>>>>>>>> To view this discussion on the web visit >>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVPG6np80msDXGDyzqOMA6E-7mtqFQpDSw8w5m3X%3DEKOg%40mail.gmail.com >>>>>>>>> >>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVPG6np80msDXGDyzqOMA6E-7mtqFQpDSw8w5m3X%3DEKOg%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>> . >>>>>>>>> >>>>>>>> -- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "blink-dev" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to blink-dev+...@chromium.org. >>>>> To view this discussion on the web visit >>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXorTe7SSPt8iZt5ZjVi0Qh8qd%2BPdEGMOzSQj45e0Z1VQ%40mail.gmail.com >>>>> >>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXorTe7SSPt8iZt5ZjVi0Qh8qd%2BPdEGMOzSQj45e0Z1VQ%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>> . >>>>> >>>> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+...@chromium.org. >> To view this discussion on the web visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaB5P6Ys%3DxMyB%3D7HvLJEa0Axp5uCcfbPQqurN2ADdasYgQ%40mail.gmail.com >> >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAF8qwaB5P6Ys%3DxMyB%3D7HvLJEa0Axp5uCcfbPQqurN2ADdasYgQ%40mail.gmail.com?utm_medium=email&utm_source=footer> >> . >> >> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d88a209b-2d64-451c-8142-81b3041a9b1cn%40chromium.org.