LGTM2

On Thu, Aug 26, 2021 at 9:14 AM Matt Menke <[email protected]> wrote:

> Re-sending this in groups UI, since my last two emails took 2 days to show
> up, and my latest one hasn't shown up on the groups UI yet.
>
> No, I'm not - I don't think there's a reasonable way to do this.  GURLs
> are not constructed in a single place.  This affects navigations to URLs,
> favicon URLs, fetch URLs, URLs constructed directly, redirects to URLs,
> proxy URLs, PAC script URLs, headless debugging URLs, DoH URLs, etc.
>
> On Thursday, August 26, 2021 at 11:56:42 AM UTC-4 Yoav Weiss wrote:
>
>> Also, are you planning to have a deprecation period with e.g. console
>> errors to let developers know this will break soon?
>>
>> On Thu, Aug 26, 2021, 17:54 Yoav Weiss <[email protected]> wrote:
>>
>>> 3 are needed
>>>
>>> On Thu, Aug 26, 2021, 17:53 Matt Menke <[email protected]> wrote:
>>>
>>>> Is one LGTM enough for intent-to-deprecates, or do I need 3?
>>>>
>>>> On Mon, Aug 23, 2021 at 3:50 AM Yoav Weiss <[email protected]>
>>>> wrote:
>>>>
>>>>> Seems like we've got a positive signal from Mozilla, along with a spec
>>>>> bug <https://github.com/whatwg/url/issues/632>.
>>>>>
>>>>> LGTM1 to remove, while fixing that issue in spec (and potentially in
>>>>> implementation)
>>>>>
>>>>> On Sun, Aug 22, 2021 at 10:52 PM Matt Menke <[email protected]> wrote:
>>>>>
>>>>>> Sorry, that should be "before instantiating content" (Or "before
>>>>>> calling ContentMain")
>>>>>>
>>>>>> On Sun, Aug 22, 2021 at 4:51 PM Matt Menke <[email protected]> wrote:
>>>>>>
>>>>>>> I've poked around here, and I'm not sure it's possible to wire this
>>>>>>> up to a base::Feature.  Headless runs some code before instantiating
>>>>>>> context, including parsing a remote debugging IP address from the 
>>>>>>> command
>>>>>>> line.  This results in calling the IPv4 parser before content, and thus 
>>>>>>> the
>>>>>>> global feature list, is loaded, which results in the feature code
>>>>>>> CHECKing.  Even if we figured out a way to work around this, I'm 
>>>>>>> concerned
>>>>>>> that other code not exercised by the trybots may be doing the same 
>>>>>>> thing,
>>>>>>> which could result in a lot of unexpected surprises.
>>>>>>>
>>>>>>> I guess we could add a command line switch to bypass the check,
>>>>>>> though that's more difficult to use than a base::Feature, and can't be 
>>>>>>> set
>>>>>>> server-side. Open to other ideas.
>>>>>>>
>>>>>>> On Fri, Aug 20, 2021 at 10:16 AM Matt Menke <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> On second thought, doesn't seem to be any benefit to a partial
>>>>>>>> rollout on prerelease channels, so probably just land it with an 
>>>>>>>> enabled by
>>>>>>>> default base::Feature.
>>>>>>>>
>>>>>>>> On Fri, Aug 20, 2021 at 7:57 AM Matt Menke <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> I'm planning to ship it behind a feature (enabled by default,
>>>>>>>>> after experimenting on pre-release channels) to allow emergency 
>>>>>>>>> disabling.
>>>>>>>>>
>>>>>>>>> On Fri, Aug 20, 2021 at 12:53 AM Yoav Weiss <
>>>>>>>>> [email protected]> wrote:
>>>>>>>>>
>>>>>>>>>> OK, I'm convinced that these are not "real" hosts, and that
>>>>>>>>>> breaking them will not result in actual user-visible breakage. Would 
>>>>>>>>>> it be
>>>>>>>>>> possible to ship this with a server-side flag that'd enable us to 
>>>>>>>>>> quickly
>>>>>>>>>> revert in case we're wrong?
>>>>>>>>>>
>>>>>>>>>> On Thu, Aug 19, 2021 at 6:09 PM Matt Menke <[email protected]>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> So given information on this thread, I think the ways these can
>>>>>>>>>>> succeed are possibly:
>>>>>>>>>>> 1)  Entries in the HOSTS file.
>>>>>>>>>>> 2)  Intermediary DNS servers or MitMs typo squatting, or
>>>>>>>>>>> actively attacking the user.
>>>>>>>>>>> 3)  Local DNS servers providing additional DNS results.
>>>>>>>>>>> 4)  Suffix search (which would trigger on, e.g., "1533.67.89"
>>>>>>>>>>> but not "67.89.1533")
>>>>>>>>>>> 5)  mDNS
>>>>>>>>>>> 6)  Local tools injecting DNS lookup results.
>>>>>>>>>>>
>>>>>>>>>>> Unfortunately, we don't have a good way to gather hard data on
>>>>>>>>>>> which are more common.  Given that there are potential security
>>>>>>>>>>> implications here, I'm reluctant to wait for another round of data
>>>>>>>>>>> gathering, though we could probably distinguish cases 4) and 5) 
>>>>>>>>>>> from the
>>>>>>>>>>> others, and 1) as well, at least on some platforms.  Also not sure 
>>>>>>>>>>> how
>>>>>>>>>>> useful just knowing about those cases would be.
>>>>>>>>>>> On Thursday, August 19, 2021 at 11:54:29 AM UTC-4 Harald
>>>>>>>>>>> Alvestrand wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Thanks - I misremembered which end of the class B network got
>>>>>>>>>>>> jammed together. 67.89.31533 is indeed the one that is "legal" 
>>>>>>>>>>>> syntax, and
>>>>>>>>>>>> so of course 67.89.1 is too.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:20 PM Matt Menke <[email protected]>
>>>>>>>>>>>> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Note that 127.0.1 is mapped to 127.0.0.1 by GURL, following
>>>>>>>>>>>>> the URL spec, so that would generally not make it to the DNS 
>>>>>>>>>>>>> resolver
>>>>>>>>>>>>> (unless something tried to resolve it directly).  Per the URL 
>>>>>>>>>>>>> spec,
>>>>>>>>>>>>> "31533.67.89" would not be normalized by GURL, but "67.89.31533" 
>>>>>>>>>>>>> would be
>>>>>>>>>>>>> converted to 67.89.123.45.  My instrumentation was at the DNS 
>>>>>>>>>>>>> layer, so
>>>>>>>>>>>>> "127.0.1" and "67.89.31533" would not show up as problematic 
>>>>>>>>>>>>> hostnames in
>>>>>>>>>>>>> my metrics, though "31533.67.89" would.
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 9:10 AM Harald Alvestrand <
>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> An interesting property of all-numeric hostnames is that they
>>>>>>>>>>>>>> *may* be legitimate IPv4 addresses using highly archaic IP 
>>>>>>>>>>>>>> address formats
>>>>>>>>>>>>>> - we're so used to the 123.45.67.89 syntax that we forget that 
>>>>>>>>>>>>>> 31533.67.89
>>>>>>>>>>>>>> once was regarded as a legitimate way to encode the same address 
>>>>>>>>>>>>>> (class B
>>>>>>>>>>>>>> notation).
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> There are also certain resolvers that will "helpfully" map an
>>>>>>>>>>>>>> all-numeric hostname presented in DNS to an IP address without 
>>>>>>>>>>>>>> asking
>>>>>>>>>>>>>> anyone.
>>>>>>>>>>>>>> So if those two bugs (or "archaic features") occur together,
>>>>>>>>>>>>>> the result may be a successful resolution.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> No idea why it would occur more often on Android than on
>>>>>>>>>>>>>> Windows, though. And my Linux boxes don't resolve 127.0.1 to 
>>>>>>>>>>>>>> anything.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:42 PM Yoav Weiss <
>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> Interesting! What happens then in the "successful
>>>>>>>>>>>>>>> resolution" case Matt mentioned?
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:39 PM Harald Alvestrand <
>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> Department of odd facts:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> - The ICANN rules for new TLDs forbid all top level domain
>>>>>>>>>>>>>>>> names that start with a digit
>>>>>>>>>>>>>>>> - The IDNA rules for bidirectional scripts forbid domain
>>>>>>>>>>>>>>>> names that start with a digit (Unicode bidi afficandoes will 
>>>>>>>>>>>>>>>> know why)
>>>>>>>>>>>>>>>> - The only real reason why leading digits aren't outlawed
>>>>>>>>>>>>>>>> in domain names at the second level is 3com.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> It seems safe to say that no legitimate fully qualified
>>>>>>>>>>>>>>>> hostname will ever have a last component consisting only of 
>>>>>>>>>>>>>>>> digits.
>>>>>>>>>>>>>>>> That means the only time we could get a legitimate hostname
>>>>>>>>>>>>>>>> is for something that has to be resolved via a search path.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:33 PM Yoav Weiss <
>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:28 PM Matt Menke <
>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> I created the title using Chrome Status's deprecation
>>>>>>>>>>>>>>>>>> template, so any confusion should be blamed on that.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> +Jason Robbins - on the title issues.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> I used the "Draft Intent to Deprecate and Remove email"
>>>>>>>>>>>>>>>>>> button, and assume I'd need to do a "Draft Intent to Ship 
>>>>>>>>>>>>>>>>>> email" before
>>>>>>>>>>>>>>>>>> shipping to stable, after a 50% trial on prerelease channels.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> There's no need for 2 emails for removals. We can discuss
>>>>>>>>>>>>>>>>> the full deprecation, experimentation/trials and removal on 
>>>>>>>>>>>>>>>>> stable here.
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:15 AM Yoav Weiss <
>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:36 PM Matt Menke <
>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 5:23 PM Yoav Weiss <
>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:18 PM Matt Menke <
>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 4:53 PM Yoav Weiss <
>>>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 8:47 PM 'Matt Menke' via
>>>>>>>>>>>>>>>>>>>>>>> blink-dev <[email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Contact [email protected]
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> ExplainerNone
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Specificationhttps://url.spec.whatwg.org/
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses,
>>>>>>>>>>>>>>>>>>>>>>>> but end in numbers are treated as valid, and looked up 
>>>>>>>>>>>>>>>>>>>>>>>> via DNS (e.g.,
>>>>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/). Per the Public Suffix List
>>>>>>>>>>>>>>>>>>>>>>>> spec, the eTLD+1 of the hostname in that URL should be 
>>>>>>>>>>>>>>>>>>>>>>>> "127.1". If that is
>>>>>>>>>>>>>>>>>>>>>>>> ever fed back into a URLs, "http://127.1/
>>>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/>" is mapped to "
>>>>>>>>>>>>>>>>>>>>>>>> http://127.0.0.1/"; by the URL spec, which seems
>>>>>>>>>>>>>>>>>>>>>>>> potentially dangerous. "127.0.0.0.1" could also 
>>>>>>>>>>>>>>>>>>>>>>>> potentially be used to
>>>>>>>>>>>>>>>>>>>>>>>> confuse users. We want to reject URLs with these 
>>>>>>>>>>>>>>>>>>>>>>>> hostnames.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Blink componentInternals>Network>DNS
>>>>>>>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3EDNS>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Motivation
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses,
>>>>>>>>>>>>>>>>>>>>>>>> but end in numbers are treated as valid hostnames, and 
>>>>>>>>>>>>>>>>>>>>>>>> looked up via DNS.
>>>>>>>>>>>>>>>>>>>>>>>> Example hostnames: 127.0.0.0.1, foo.0.1, 10.0.0.09, 
>>>>>>>>>>>>>>>>>>>>>>>> 08.1.2.3. These can be
>>>>>>>>>>>>>>>>>>>>>>>> problematic for the following reason: * "
>>>>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/"; has an eTLD+1 of "127.1", per
>>>>>>>>>>>>>>>>>>>>>>>> the public suffix list spec. If that's ever used as 
>>>>>>>>>>>>>>>>>>>>>>>> the hostname in a new
>>>>>>>>>>>>>>>>>>>>>>>> URL, however, as in "http://127.1
>>>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/>", it will then get mapped to "
>>>>>>>>>>>>>>>>>>>>>>>> http://127.0.0.1/";, per the URL spec, which is a
>>>>>>>>>>>>>>>>>>>>>>>> different host, which is not safe. * "
>>>>>>>>>>>>>>>>>>>>>>>> http://127.0.0.0.1"; and "http://1.2.3.09";, both of
>>>>>>>>>>>>>>>>>>>>>>>> which are looked up via DNS rather than failing or 
>>>>>>>>>>>>>>>>>>>>>>>> being treated as IPv4
>>>>>>>>>>>>>>>>>>>>>>>> hostnames, also seem potentially confusing. While no 
>>>>>>>>>>>>>>>>>>>>>>>> exploit is currently
>>>>>>>>>>>>>>>>>>>>>>>> known here, we want to remove support for these as a 
>>>>>>>>>>>>>>>>>>>>>>>> preventative security
>>>>>>>>>>>>>>>>>>>>>>>> measure. The URL spec has been updated so that any URL 
>>>>>>>>>>>>>>>>>>>>>>>> with a hostname
>>>>>>>>>>>>>>>>>>>>>>>> ending in a number that's not an IPv4 address 
>>>>>>>>>>>>>>>>>>>>>>>> (including, e.g.,
>>>>>>>>>>>>>>>>>>>>>>>> http://foo.1./, but not http://foo.1../) is
>>>>>>>>>>>>>>>>>>>>>>>> considered invalid. Since this is part of the URL 
>>>>>>>>>>>>>>>>>>>>>>>> spec, not the DNS spec,
>>>>>>>>>>>>>>>>>>>>>>>> we want to reject these URLs are the GURL layer, for 
>>>>>>>>>>>>>>>>>>>>>>>> URLs with appropriate
>>>>>>>>>>>>>>>>>>>>>>>> protocols (http, https, ws, wss, file). For 
>>>>>>>>>>>>>>>>>>>>>>>> consistency, we should also
>>>>>>>>>>>>>>>>>>>>>>>> fail DNS lookup attempts of these sorts of hostnames.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Initial public proposal
>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> TAG reviewNot required for an Intent to Deprecate,
>>>>>>>>>>>>>>>>>>>>>>>> I believe.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> TAG review statusNot applicable
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Any URL with an affected hostname will fail to
>>>>>>>>>>>>>>>>>>>>>>>> load, and will need to be migrated to another 
>>>>>>>>>>>>>>>>>>>>>>>> hostname. URLs of this form
>>>>>>>>>>>>>>>>>>>>>>>> do appear to be in use, though it's not clear under 
>>>>>>>>>>>>>>>>>>>>>>>> what circumstances. No
>>>>>>>>>>>>>>>>>>>>>>>> entry in the public suffix list is affected. Affected 
>>>>>>>>>>>>>>>>>>>>>>>> URLs make up no more
>>>>>>>>>>>>>>>>>>>>>>>> than 0.0003% of hostnames looked up via the host 
>>>>>>>>>>>>>>>>>>>>>>>> resolver on any platform,
>>>>>>>>>>>>>>>>>>>>>>>> and are basically not used in any file URLs, according 
>>>>>>>>>>>>>>>>>>>>>>>> to our metrics.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Do we have reason to believe these hostnames are not
>>>>>>>>>>>>>>>>>>>>>>> legitimate ones?
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Unfortunately, we have no insight into them - they
>>>>>>>>>>>>>>>>>>>>>> could be mistyped URLs sent to typo squatting ISPs that 
>>>>>>>>>>>>>>>>>>>>>> OSX lets through
>>>>>>>>>>>>>>>>>>>>>> but the Windows host resolver blocks, and various 
>>>>>>>>>>>>>>>>>>>>>> flavors of Linux treat
>>>>>>>>>>>>>>>>>>>>>> differently.  Or they could be mapped via a hosts file, 
>>>>>>>>>>>>>>>>>>>>>> or they could be
>>>>>>>>>>>>>>>>>>>>>> hostnames that only resolve on public networks.  Could 
>>>>>>>>>>>>>>>>>>>>>> be some network tool
>>>>>>>>>>>>>>>>>>>>>> that uses them when installed locally, but is only 
>>>>>>>>>>>>>>>>>>>>>> available on certain
>>>>>>>>>>>>>>>>>>>>>> platforms.  No reason to think one possibility is more 
>>>>>>>>>>>>>>>>>>>>>> likely than the
>>>>>>>>>>>>>>>>>>>>>> others.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Do we have UKM for them that would enable us to test a
>>>>>>>>>>>>>>>>>>>>> random sample?
>>>>>>>>>>>>>>>>>>>>> I'm concerned about blocking those hostnames if they
>>>>>>>>>>>>>>>>>>>>> are legitimate, as that's something that a web developer 
>>>>>>>>>>>>>>>>>>>>> can't do anything
>>>>>>>>>>>>>>>>>>>>> about.
>>>>>>>>>>>>>>>>>>>>> So even if the number of hosts is small, I'd like to
>>>>>>>>>>>>>>>>>>>>> get more certainty that they are *not* legitimate hosts 
>>>>>>>>>>>>>>>>>>>>> before blocking
>>>>>>>>>>>>>>>>>>>>> them.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> We have UKM on their number (0.0003% of DNS lookups on
>>>>>>>>>>>>>>>>>>>> OSX, less elsewhere - we can't meaningfully instrument 
>>>>>>>>>>>>>>>>>>>> percent of
>>>>>>>>>>>>>>>>>>>> created GURLs), but we don't have their hostnames, what 
>>>>>>>>>>>>>>>>>>>> they resolve to, or
>>>>>>>>>>>>>>>>>>>> know anything else about them, unfortunately.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Navigation to a subset of these as frame URLs were
>>>>>>>>>>>>>>>>>>>> broken at one point - I'm pretty sure the breakage even 
>>>>>>>>>>>>>>>>>>>> made it to stable:
>>>>>>>>>>>>>>>>>>>> https://crbug.com/1173238.  There were no reports of
>>>>>>>>>>>>>>>>>>>> problems.  Only non-IPv4 URLs where the last two 
>>>>>>>>>>>>>>>>>>>> components were broken,
>>>>>>>>>>>>>>>>>>>> though, and it didn't affect subresources.  On OSX and 
>>>>>>>>>>>>>>>>>>>> Android, over 99% of
>>>>>>>>>>>>>>>>>>>> successfully resolved problematic hostnames fit into that 
>>>>>>>>>>>>>>>>>>>> bucket, though on
>>>>>>>>>>>>>>>>>>>> Linux, only about 2% do.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> That doesn't give us any hard conclusions, except
>>>>>>>>>>>>>>>>>>>> they're either not deliberate navigations on OSX/Android, 
>>>>>>>>>>>>>>>>>>>> or they're not
>>>>>>>>>>>>>>>>>>>> navigations.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> :|
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> One more question: Is this an intent to Prototype or an
>>>>>>>>>>>>>>>>>>> intent to deprecate? The title is a bit unclear..
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> On OSX and Android, about 90% of host resolver
>>>>>>>>>>>>>>>>>>>>>>>> lookups for these hostnames succeed, 60% do on Linux, 
>>>>>>>>>>>>>>>>>>>>>>>> and 2% on Windows and
>>>>>>>>>>>>>>>>>>>>>>>> ChromeOS.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Do you know where those failures are coming from?
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Could be typos, could be the Windows and ChromeOS
>>>>>>>>>>>>>>>>>>>>>> host resolvers don't let them through.  Since we've had 
>>>>>>>>>>>>>>>>>>>>>> no filed bugs about
>>>>>>>>>>>>>>>>>>>>>> them, I suspect the failures are not deliberate 
>>>>>>>>>>>>>>>>>>>>>> navigations or intended
>>>>>>>>>>>>>>>>>>>>>> network requests.  I'm much more interested in where the 
>>>>>>>>>>>>>>>>>>>>>> successes are
>>>>>>>>>>>>>>>>>>>>>> coming from, myself.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> To allow for emergency disabling in case of wider
>>>>>>>>>>>>>>>>>>>>>>>> than expected breakage, I intend to add a feature for 
>>>>>>>>>>>>>>>>>>>>>>>> it, and do a 50%
>>>>>>>>>>>>>>>>>>>>>>>> field trial on pre-release channels, though plan to 
>>>>>>>>>>>>>>>>>>>>>>>> just enable the
>>>>>>>>>>>>>>>>>>>>>>>> feature, rather than do a gradual rollout to stable, 
>>>>>>>>>>>>>>>>>>>>>>>> given the low usage.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Gecko: Positive (
>>>>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619#issuecomment-890826499
>>>>>>>>>>>>>>>>>>>>>>>> <https://www.chromestatus.com/admin/features/launch/5679790780579840/1?intent=1>
>>>>>>>>>>>>>>>>>>>>>>>> )
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> Can you file an official position request?
>>>>>>>>>>>>>>>>>>>>>>> https://bit.ly/blink-signals
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Done for Mozilla:
>>>>>>>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/568
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Should I also do this for WebKit as well?  They have
>>>>>>>>>>>>>>>>>>>>>> in process CLs, so not sure if it's still needed.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Agree that in-flight patches for WebKit are a
>>>>>>>>>>>>>>>>>>>>> sufficient positive signal.
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> WebKit: In development (
>>>>>>>>>>>>>>>>>>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=228826)
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Web developers: No signals
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Activation
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> This breaks anything using one of these domains,
>>>>>>>>>>>>>>>>>>>>>>>> and requires migrating to other hostnames.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Security
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> None
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> These will act like any other invalid URL. Behavior
>>>>>>>>>>>>>>>>>>>>>>>> is context dependent. Since this is logic deep within 
>>>>>>>>>>>>>>>>>>>>>>>> GURL, and GURLs are
>>>>>>>>>>>>>>>>>>>>>>>> created in a great many places, console warnings 
>>>>>>>>>>>>>>>>>>>>>>>> specifically for this seem
>>>>>>>>>>>>>>>>>>>>>>>> not practical.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>>>>>>>>>>>> ?No.  Javascript URL construction is tested, but
>>>>>>>>>>>>>>>>>>>>>>>> URLs are used in a great many other places, which 
>>>>>>>>>>>>>>>>>>>>>>>> don't have test
>>>>>>>>>>>>>>>>>>>>>>>> coverage, since DNS lookups for these domains must 
>>>>>>>>>>>>>>>>>>>>>>>> succeed in the first
>>>>>>>>>>>>>>>>>>>>>>>> place for the tests to be meaningful.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Flag name
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Requires code in //chrome?False
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Tracking bughttps://crbug.com/1237032
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>>>>>>>>>>> DevTrial on desktop 95
>>>>>>>>>>>>>>>>>>>>>>>> DevTrial on Webview 95
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5679790780579840
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome
>>>>>>>>>>>>>>>>>>>>>>>> Platform Status <https://www.chromestatus.com/>.
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>>>> You received this message because you are
>>>>>>>>>>>>>>>>>>>>>>>> subscribed to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>>>> [email protected].
>>>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>> You received this message because you are subscribed to
>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>>>>>> from it, send an email to [email protected].
>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com
>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cff2a72a-f37b-4cc9-aeff-51ea86c47674n%40chromium.org
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cff2a72a-f37b-4cc9-aeff-51ea86c47674n%40chromium.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-mPBO%3DCEKZmehnpZKaOMNLqFjhXZmXzP4agJ9e%3D4jUFQ%40mail.gmail.com.

Reply via email to