Currently, It's on the 
code: 
https://boringssl.googlesource.com/boringssl/+/master/include/openssl/tls1.h?pli=1#247
Once we standardize the ALPS RFC draft, we can finalize the value.  Hope 
this helps. 

On Saturday, January 20, 2024 at 7:50:46 PM UTC-5 Chris Harrelson wrote:

> Thanks for clarifying. Last question: where in the specifications is the 
> new 17613 code point documented?
>
> On Fri, Jan 19, 2024 at 12:59 PM Mike Taylor <miketa...@chromium.org> 
> wrote:
>
>> In our OWNERS meeting this week, there was some confusion on what's being 
>> proposed here (which is understandable, this isn't quite a typical intent 
>> for web exposed feature). Here's a summary of what we're trying to 
>> accomplish:
>>
>> 1) We shipped support for the ACCEPT_CH frame over h2 and h3 back in M96, 
>> which relies on the TLS ALPS protocol extension.
>> 2) There are 2 parts to this: the client being able to understand 
>> ALPS/ACCEPT_CH (and in return do something useful), and the server being 
>> able to send it.
>> 3) Because of a (long fixed) bug present in Chromium's implementation, 
>> it's risky for a server to send too much data via ACCEPT_CH, so it's 
>> usefulness is potentially limited.
>> 4) In order to guarantee that older clients don't have this bug, we 
>> propose to rev the version (aka, code point) at the protocol layer. This 
>> way, if a server sends the new code point and the client understands it, it 
>> can send a larger payload without triggering the bug (which may result in 
>> sad things like a connection being refused).
>> 5) This is sort of web observable, but right now if servers that support 
>> the old code point continue to send the old code point - nothing will 
>> break. Chromium will support both for now, with hopes to deprecate and 
>> remove the older one in the future when we're confident it won't result in 
>> performance regressions for servers sending ACCEPT_CH (since this is a 
>> performance optimization).
>>
>> I hope that helps clear it up, and I'm sure Victor or David will chime in 
>> if I'm getting something wrong. :)
>>
>> And to be clear - this isn't a request for a deprecation or removal 
>> (yet), but for shipping the new code point.
>> On 1/17/24 11:16 AM, Victor Tan wrote:
>>
>> If the server received the new code point, while it doesn't support, the 
>> ALPS extension will ignore. This also mean client might not know the 
>> server's client hints preferences before the first request. Currently, only 
>> few sites using the ALPS extension.  As TLS extension is negotiated, the 
>> server need to support both code points during the transition period, after 
>> some time, the server can drop the old one.  
>>
>> On Wednesday, January 17, 2024 at 11:00:13 AM UTC-5 Yoav Weiss wrote:
>>
>>> On Saturday, January 13, 2024 at 12:08:33 AM UTC+1 Victor Tan wrote:
>>>
>>> Contact emails 
>>>
>>> victor...@chromium.org, miketa...@chromium.org, david...@chromium.org
>>>
>>> Explainer 
>>>
>>> https://github.com/WICG/client-hints-infrastructure/
>>> blob/main/reliability.md 
>>>
>>> Specification 
>>>
>>> https://tools.ietf.org/html/draft-davidben-http-client-hint-reliability 
>>>  
>>>
>>> https://tools.ietf.org/html/draft-vvv-httpbis-alps 
>>>
>>> https://tools.ietf.org/html/draft-vvv-tls-alps    
>>>
>>>  
>>> Summary 
>>>
>>> Shipping a new code point (17613) for TLS ALPS extension to allow adding 
>>> more data in the ACCEPT_CH HTTP/2 and HTTP/3 frame. The ACCEPT_CH HTTP/2 
>>> frame with the existing TLS ALPS extension code point (17513) had an 
>>> arithmetic overflow bug <https://crbug.com/1292069> in the Chrome ALPS 
>>> decoder. It limits the capability to add more than 128 bytes data (in 
>>> theory, the problem range is 128 bytes to 255 bytes) to the ACCEPT_CH 
>>> frame. With the new ALPS code point, we can fully mitigate the issue.
>>>
>>> Blink component 
>>>
>>> Blink>Network>ClientHints 
>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component%3ABlink%3ENetwork%3EClientHints%2C&can=2>
>>>
>>> TAG review 
>>>
>>> https://github.com/w3ctag/design-reviews/issues/549 
>>>
>>> TAG review status 
>>>
>>> Closed
>>>
>>> Risks
>>> Interoperability and Compatibility 
>>>
>>> This is switching to a new code point for the TLS ALPS extension. It 
>>> won’t change the design of ALPS and ACCEPT_CH mechanism implementation.  
>>> The main source of compatibility risk is that it causes conflicts with ALPS 
>>> negotiation since some clients could still use the old code point while 
>>> others are switching to use the new code point.  The ALPS extension could 
>>> be ignored if the code point doesn’t match during negotiation, which means 
>>> the server's client hints preferences won’t be delivered in the ACCEPT_CH 
>>> HTTP/2 and HTTP/3 frame.  We mitigate this by enabling servers to support 
>>> both code points, monitoring both code points usage and removing the old 
>>> ALPS code point support in a future intent once the usage is low enough. We 
>>> also split the rollout into two phases: we first start to enable the new 
>>> ALPS code point for ACCEPT_CH  with HTTP/3 frame in a slow rollout, and 
>>> then eventually enable the new code point with HTTP/2 frame.
>>>
>>>
>>> Does the server have an indication if the client in question supports 
>>> the newer code point?
>>> If not, what would we expect servers that support the newer code point 
>>> to do?
>>>
>>>  
>>>
>>>
>>> Edge: No signals
>>>
>>> Firefox: Pending https://github.com/mozilla/
>>> standards-positions/issues/510
>>> Safari: Pending https://lists.webkit.org/pipermail/webkit-dev/2021-
>>> April/031768.html
>>>
>>> Web/Framework developers: https://twitter.com/Sawtaytoes/status/
>>> 1369031447940526080 https://twitter.com/_jayphelps/status/
>>> 1369023028735148032
>>>
>>> Activation
>>>
>>> The site’s TLS and HTTP serving application would need to be updated to 
>>> support this new code point. We aren’t aware of many sites using this 
>>> feature yet, however.
>>>
>>> Debuggability 
>>>
>>> No special DevTools support needed. The effects of the code point change 
>>> of ACCEPT_CH frame will be visible in the DevTools’ network tab. Also, the 
>>> NetLog will record the ACCEPT_CH frame value if TLS ALPS extension is 
>>> negotiated successfully. 
>>>
>>> Will this feature be supported on all six Blink platforms (Windows, Mac, 
>>> Linux, Chrome OS, Android, and Android WebView)? 
>>>
>>> Yes
>>>
>>> Is this feature fully tested by web-platform-tests 
>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>> ? 
>>>
>>> No, this feature is tested with browser-side tests. We can’t test 
>>> TLS-adjacent features currently through web-platform-tests. See this issue: 
>>> https://github.com/web-platform-tests/wpt/issues/20159   
>>>
>>> Flag name 
>>>
>>> UseNewAlpsCodepointHttp2
>>>
>>> UseNewAlpsCodepointQUIC
>>>
>>> Tracking bug 
>>>
>>> b/289087287 
>>>
>>> Launch bug 
>>>
>>> https://launch.corp.google.com/launch/4299022 
>>>
>>> Link to entry on the Chrome Platform Status
>>> https://chromestatus.com/feature/5149147365900288 
>>>
>>> -- 
>>
> You received this message because you are subscribed to the Google Groups 
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to blink-dev+unsubscr...@chromium.org.
>>
> To view this discussion on the web visit 
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c704d985-a5cc-4e5e-99b0-1f78cc4428e6%40chromium.org
>>  
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c704d985-a5cc-4e5e-99b0-1f78cc4428e6%40chromium.org?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c8b26011-b7fc-4ce7-8ef0-8192f0ffadb2n%40chromium.org.

Reply via email to