[LINK] New Chrome security measure aims to curtail an entire class of Web attack
Kim Holburn
kim at holburn.net
Mon Jan 17 14:41:22 AEDT 2022
It's about time.
https://arstechnica.com/information-technology/2022/01/new-chrome-security-measure-aims-to-curtail-an-entire-class-of-web-attack/
> For more than a decade, the Internet has remained vulnerable to a class of attacks that uses browsers as a beachhead for accessing
> routers and other sensitive devices on a targeted network. Now, Google is finally doing something about it.
>
> Starting in Chrome version 98, the browser will begin relaying requests when public websites want to access endpoints inside the
> private network of the person visiting the site. For the time being, requests that fail won't prevent the connections from
> happening. Instead, they'll only be logged. Somewhere around Chrome 101—assuming the results of this trial run don't indicate
> major parts of the Internet will be broken—it will be mandatory for public sites to have explicit permission before they can
> access endpoints behind the browser.
>
> The planned deprecation of this access comes as Google enables a new specification known as private network access
> <https://wicg.github.io/private-network-access/>, which permits public websites to access internal network resources only after
> the sites have explicitly requested it and the browser grants the request. PNA communications are sent using the CORS, or
> Cross-Origin Resource Sharing, protocol. Under the scheme, the public site sends a preflight request in the form of the new header
> |Access-Control-Request-Private-Network: true|. For the request to be granted, the browser must respond with the corresponding
> header |Access-Control-Allow-Private-Network: true|.
>
--
Kim Holburn
IT Network & Security Consultant
+61 404072753
mailto:kim at holburn.net aim://kimholburn
skype://kholburn - PGP Public Key on request
More information about the Link
mailing list