mikewest Profile Banner
Mike West Profile
Mike West

@mikewest

Followers
6K
Following
2K
Statuses
15K

@[email protected] - Making the web marginally less insecure, one deprecation at a time. I work on Chrome, but my tweets are my own, etc, etc. He/him.

München, DE
Joined December 2006
Don't wanna be here? Send us removal request.
@mikewest
Mike West
3 years
We've improved our implementation of this feature, and are trying preflights again in Chrome 102 (which started rolling out yesterday). With luck, servers will be a little more tolerant of OPTIONS requests then they were the first time around... :)
@mikewest
Mike West
3 years
FYI: Your intranet services will likely receive new OPTIONS requests with `Access-Control-Request-Private-Network` headers as Chrome 98 rolls out. We're experimenting with preflights for requests initiated outside of your local network as part of (1/3)
3
6
11
@mikewest
Mike West
2 months
@davidcadrian @durumcrustulum If boring was XXtremely fast, this wouldn't be a problem. Clearly, @agl, @davidben__ et al. need to step it up.
1
0
3
@mikewest
Mike West
8 months
@ericlaw Yes. My recollection is that network state had more negative impact than cache partitioning, and also that the team did a fairly intense amount of work to understand those impacts. @miketaylr can likely point you to docs? I'm coming up short. :/
0
0
1
@mikewest
Mike West
8 months
@mnot @yoavweiss I could also follow up on the email I wrote y'all ~4 years ago about running the ID through the independent stream. 🤷 Seems worth asking again whether other vendors are interested, but my strong suspicion is that folks will be (even) less interested in cookie changes these days.
1
0
1
@mikewest
Mike West
8 months
@yoavweiss @mnot 1. It seemed like folks recognized that the core motivation is not a Google problem, but an intranet problem that's relatively common. Still, people don't like cookies. 🤷 2. I think prioritizing secure is in 6265bis:
1
0
2
@mikewest
Mike West
8 months
@yoavweiss I'll take that back a little. People did object to adding complexity, questioned the necessity, and suggested experimenting with the number of cookies per domain instead. See :) But folks did recognize the problem, and a solution would be nice.
1
0
3
@mikewest
Mike West
2 years
@patricktoomey @arturjanc @frgx Ah, hindsight. If CORP hadn't existed at the time we were exploring Spectre mitigations, I think we would have run with something like `COEP: require-cors` initially. I do think that the distinction between ACAO and CORP is meaningful, but probably too nuanced to matter.
0
0
2
@mikewest
Mike West
2 years
@patricktoomey @frgx @arturjanc `COEP: credentialless` and `<iframe credentialless>` strip credentials from cross-origin (as opposed to cross-site) requests, which aligns with the per-origin process model that's necessary to mitigate some kinds of side-channels.
1
0
1
@mikewest
Mike West
2 years
@patricktoomey @arturjanc (Artur is smart. And, happily, prolific. :) )
0
0
1
@mikewest
Mike West
2 years
@domenic Deprecation, unfortunately, is much easier than removal.
0
0
5
@mikewest
Mike West
2 years
@davidcadrian is an approach that I think isn't crazy. I'd change some things if I was writing it today, but the framing still feels right to me.
0
0
1
@mikewest
Mike West
2 years
@zcorpan I agree that this will be a good thing, but a slight nit: `document.domain` will only be a no-op by default. Developers can opt-into its usage by explicitly opting-out of the potential for origin-based isolation via `Origin-Agent-Cluster: ?0`.
1
0
1
@mikewest
Mike West
2 years
@zcorpan @SecurityMB My understanding is that Facebook isn't a blocker. We have run across an apparent bug in Chromium's handling of `Origin-Agent-Cluster` inheritance that's affecting some enterprise applications; it's not clear to me whether we're going to make 114.
1
0
0
@mikewest
Mike West
2 years
RT @w3cdevs: The workshop is presented jointly by @w3c, @theopenssf @owasp, and @openjsf. The event's agenda is built by a PC constituted o…
0
3
0
@mikewest
Mike West
2 years
@garethheyes @sudhanshur705 No worries. Chrome is still working towards shipping it, and no other engine has started on it yet (AFAIK), so there's still some work to do to make it clearly part of the platform. :)
1
0
2
@mikewest
Mike West
2 years
@garethheyes @sudhanshur705 forces a new preflight for all requests that cross a network boundary the browser understands (.
1
0
2
@mikewest
Mike West
2 years
@garethheyes @sudhanshur705 Ideally, this will be more difficult once we ship chrome://flags/#private-network-access-respect-preflight-results.
1
0
3
@mikewest
Mike West
2 years
RT @kcotsneb: #SecWeb on May 25 (co-located with S&P) has an exciting keynote speaker lineup with @arturjanc and Yinzhi Cao. Need a reason…
0
3
0