mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
mikewest's comments
mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
Longer-term, it seems clear that it would be valuable to come up with ways in which we can teach browsers how to trust devices on a local network. Thus far, this hasn't been a heavy area of investment. I can imagine it becoming more important if we're able to ship restrictions like the ones described here, as they do make the capability to authenticate and encrypt communication channels to local devices more important.
mikewest | 5 years ago | on: Feedback wanted: CORS for private networks (RFC1918)
The proposal _does_ require pages that wish to request resources across a network boundary to be delivered securely, which therefore requires resources that wish to be accessible across network boundaries to be served securely (as they'd otherwise be blocked as mixed content). This places the burden upon those resources which wish to be included externally, which seems like the right place for it to land.
mikewest | 6 years ago | on: Improving privacy and security on the web
mikewest | 6 years ago | on: Improving privacy and security on the web
To that end, we've implemented the change behind two flags (chrome://flags/#same-site-by-default-cookies and chrome://flags/#cookies-without-same-site-must-be-secure) so that we can work with developers to help them migrate cookies that need to be accessible cross-site to `SameSite=None; Secure`.
Ideally, we won't unintentionally break anything when we're confident enough to ship this change.
mikewest | 6 years ago | on: Improving privacy and security on the web
https://tools.ietf.org/html/draft-west-cookie-incrementalism spells out the proposal in a bit more detail.
mikewest | 9 years ago | on: Let 'localhost' be localhost
It should be unaffected by the suggestion in this document.
mikewest | 9 years ago | on: Let 'localhost' be localhost
The next line in the document is "IPv6 loopback addresses are defined in Section 3 of [RFC5156] as '::1/128'." :)
mikewest | 9 years ago | on: Let 'localhost' be localhost
I don't mean to overconstrain the definition of loopback. If you have a good mechanism for specifying a specific IP range as loopback, and that mechanism can be understood by client software and resolution APIs, then I don't see any reason not to allow it.
The salient distinction from my perspective is traffic within a specific host, and traffic that traverses the network. If you have suggestions for language that make that distinction more clearly than the document currently does, I'm happy to incorporate it. :)
I also find it curious that this draft allows only address queries (presumably A and AAAA) under .localhost. I'd like to know the rationale for that restriction. For example, there may well be applications that only use SRV records.
https://twitter.com/dbrower/status/781001487157719040 raises similar concerns. The rationale is simple: I wanted to make the smallest change possible to RFC6761, and item 3 of https://tools.ietf.org/html/rfc6761#section-6.3 already contains the address query restriction.
It's probably reasonable to reconsider it, that's just a larger change than the one I was specifically trying to make. :)
mikewest | 13 years ago | on: Content Security Policy
I'd very much appreciate it if you could point me at things that aren't working in Canary. :)
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
2. I'm not sure what you mean.
3. We can't, and don't want to, change the license of code that's already been released. That said, most (all?) of WebCore isn't LGPL. See my favourite file, http://trac.webkit.org/browser/trunk/Source/WebCore/page/Con... for example.
4. WebKit and Chromium have historically had differing opinions regarding what makes a "good" comment. I think you can expect Blink's code to tend more and more towards Chromium-style as time goes on, but it's not going to happen overnight.
5. ~5 million lines of code that we don't currently compile or run in Chromium. That's a bit, but it won't have much effect on the binary size.
6. Short term, not much will change. Longer term, a few things will probably happen: for instance, the widget tree will likely be removed, and we'll likely be able to step back and reevaluate some changes in light of that.
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
The position we're taking is that the Content layer (in Chromium) is the right place to hook into the system: http://www.chromium.org/developers/content-module That's where we've drawn the boundary between the embeddable bits and the Chrome and browser-specific bits.
Regarding the history, I'd suggest adding some questions to the Moderator for tomorrow's video Q/A: http://google.com/moderator/#15/e=20ac1d&t=20ac1d.40&... The folks answering questions there were around right at the beginning... I only hopped on board ~2.5 years ago. :)
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
mikewest | 13 years ago | on: Blink: A rendering engine for the Chromium project
Happily(?), IPv4 networks are still pervasive, and this proposal seems clearly valuable in those environments.