Contact emailscth...@chromium.org

Explainerhttps://github.com/explainers-by-googlers/local-network-access

SpecificationNot yet

Summary

Restricts the ability to make requests to the user's local network, gated
behind a permission prompt. A local network request is any request from a
public website to a local IP address or loopback, or from a local website
(e.g. intranet) to loopback. Gating the ability for websites to perform
these requests behind a permission mitigates the risk of cross-site request
forgery attacks against local network devices such as routers, and reduces
the ability of sites to use these requests to fingerprint the user's local
network. This permission is restricted to secure contexts. If granted, the
permissions additionally relaxes mixed content blocking for local network
requests (since many local devices are not able to obtain publicly trusted
TLS certificates for various reasons). This work supersedes a prior effort
called "Private Network Access" (e.g.,
https://chromestatus.com/feature/5737414355058688,
https://chromestatus.com/feature/5954091755241472) which used preflight
requests to have local devices opt-in.

Blink componentBlink>SecurityFeature>PrivateNetworkAccess
<https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3ESecurityFeature%3EPrivateNetworkAccess%22>

Motivation

Currently public websites can probe a user's local network, perform CSRF
attacks against vulnerable local devices, and generally abuse the user's
browser as a "confused deputy" that has access inside the user's local
network or software on their local machine. Gating the ability for sites to
make local network requests behind a permission prompt helps stop the
exploitation of vulnerable devices and servers from the drive-by-web, and
gives users control over which sites can probe their local network.

Initial public proposalhttps://github.com/WICG/proposals/issues/198

TAG reviewNot yet

TAG review statusNot yet requested

Risks

Interoperability and Compatibility

Restricting local network requests behind a permission should have low
compatibility risks. Restricting this permission to secure contexts may
have risks if different browsers handle mixed content differently.
*Gecko*: No signal (previously positive about PNA though
https://github.com/mozilla/standards-positions/issues/143)

*WebKit*: No signal (previously positive about PNA though
https://github.com/WebKit/standards-positions/issues/163)

*Web developers*: No signals, but switching to a permission-gated design is
motivated by feedback from developers in response to the Private Network
Access work

*Other signals*:

WebView application risks

Does this intent deprecate or change behavior of existing APIs, such that
it has potentially high risk for Android WebView-based applications?

None


Debuggability

We plan to create DevTools Issues entries when a site would be affected by
these restrictions that includes guidance about how to meet the new
restrictions. Blocked requests will also be visible in the DevTools
Networking tab, with a distinct error.

Is this feature fully tested by web-platform-tests
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
?Not yet

Flag name on about://flagsNone

Finch feature nameLocalNetworkAccessChecks

Requires code in //chrome?True

Tracking bughttps://crbug.com/394009026

Estimated milestones

M136


Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5152728072060928?gate=5068821926510592

This intent message was generated by Chrome Platform Status
<https://chromestatus.com/>.

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALMy46SB%2Bv9dnp-wrJ4WH0R4UJmWuutq1st92%3D_zOyhnLJ_vkw%40mail.gmail.com.

Reply via email to