Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add finalResponseHeadersStart to resource timing #1108

Closed
noamr opened this issue Nov 6, 2024 · 4 comments
Closed

Add finalResponseHeadersStart to resource timing #1108

noamr opened this issue Nov 6, 2024 · 4 comments
Assignees
Labels
position: positive topic: API venue: W3C Specifications in W3C Working Groups

Comments

@noamr
Copy link

noamr commented Nov 6, 2024

Request for Mozilla Position on an Emerging Web Specification

  • Specification title: Add finalResponseHeadersStart to resource timing
  • Specification or proposal URL (if available): https://w3c.github.io/resource-timing/
  • Explainer URL (if available):
  • Proposal author(s) (@-mention GitHub accounts): @noamr @tunetheweb
  • Caniuse.com URL (optional):
  • Bugzilla URL (optional):
  • Mozillians who can provide input (optional): @sefeng211, Bas Schouten (not sure re the github handle?)
  • WebKit standards-position:

Other information

This was resolved in the WebPerfWG meeting, see minutes.

@tunetheweb
Copy link

Bas Schouten (not sure re the github handle?)

I think it's @Bas-moz

@sefeng211
Copy link
Member

finalResponseHeadersStart is the timing when the last response came. This is useful to see the timing differences for cases like early-hints where we have the first response which isn't the real response of the request.

We have no objection on this, it should be a positive for us.

@zcorpan
Copy link
Member

zcorpan commented Dec 9, 2024

@bvandersloot-mozilla can you review the privacy implications for this? Thanks.

@zcorpan zcorpan moved this from Unscreened to Needs proposed position in standards-positions review Dec 9, 2024
@bvandersloot-mozilla
Copy link
Contributor

bvandersloot-mozilla commented Dec 16, 2024

RE Privacy: network caches are already partitioned, so there is no increased risk for cache fingerprinting of 3p tracking. The privacy considerations are correct in that respect. Further, gating on Timing-Allow-Origin gives us a guarantee that no third-party is being probed via this, even in storage-access granted states.

The remaining question is, should we be worried about the increased fidelity on resource timing from a first party? This may give a clearer network latency measurement from the client to the server, but I don't believe this is anything they couldn't piece together from existing data available to them, and is probably weaker than other networking fingerprints. My verdict is that this is r+ on the privacy side.

@zcorpan zcorpan added topic: API venue: W3C Specifications in W3C Working Groups position: positive labels Dec 18, 2024
@zcorpan zcorpan closed this as completed Dec 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
position: positive topic: API venue: W3C Specifications in W3C Working Groups
Projects
Status: Needs proposed position
Development

No branches or pull requests

5 participants