Chrome nettleser, Nyheter

Deprecations and removals in Chrome 81

Deprecations and removals in Chrome 81

Deprecation and Remove «basic-card» support Payment Handler

This version of Chrome removes the basic-card polyfill for Payment Request API
in iOS Chrome. As a result, the Payment Request API is temporarily disabled in
iOS Chrome. For full details, see Rethinking Payment Request for
iOS
.

Intent to Remove |
Chrome Platform Status |
Chromium Bug

Remove supportedType field from BasicCardRequest

Specifying "supportedTypes": parameter for "basic-card" payment method
shows cards of only the requested type, which is one of «credit», "debit", or
"prepaid".

The card type parameter has been removed from the spec and is now removed from
Chrome, because of the difficulty of accurate card type determination. Merchants
today must check card type with their PSP, because they cannot trust the card
type filter in the browser:

  • Only issuing banks know the card type with certainty and downloadable card
    type databases have low accuracy, so it’s impossible to know accurately the
    type of the cards stored locally in the browser.
  • The «basic-card» payment method in Chrome no longer shows cards from Google
    Pay, which may have connections with issuing banks.

Intent to Remove |
Chrome Platform Status |
Chromium Bug

Remove the <discard> element

Chrome 81 removes the <discard> element. It is only implemented in Chromium,
and is thus not possible to use interoperably. For most use cases it can be
replaced with a combination of animation of the display property and a removal
(JavaScript) callback/event handler.

Intent to Remove |
Chrome Platform Status |
Chromium Bug

Remove TLS 1.0 and TLS 1.1

Note: Removal of TLS 1.0 and TLS 1.1 was delayed to Chrome 84, which is
expected to ship in July 2020.

TLS (Transport Layer Security) is the protocol which secures HTTPS. It has a
long history stretching back to the nearly twenty-year-old TLS 1.0 and its even
older predecessor, SSL. Both TLS 1.0 and 1.1 have a number of weaknesses.

  • TLS 1.0 and 1.1 use MD5 and SHA-1, both weak hashes, in the transcript hash
    for the Finished message.
  • TLS 1.0 and 1.1 use MD5 and SHA-1 in the server signature. (Note: this is not
    the signature in the certificate.)
  • TLS 1.0 and 1.1 only support RC4 and CBC ciphers. RC4 is broken and has since
    been removed. TLS’s CBC mode construction is flawed and is vulnerable to
    attacks.
  • TLS 1.0’s CBC ciphers additionally construct their initialization vectors
    incorrectly.
  • TLS 1.0 is no longer PCI-DSS compliant.

Supporting TLS 1.2 is a prerequisite to avoiding the above problems. The TLS
working group has deprecated TLS 1.0 and 1.1. Chrome has now also deprecated
these protocols.

Intent to Remove |
Chromestatus Tracker |
Chromium Bug

TLS 1.3 downgrade hardening bypass

TLS 1.3 includes a backwards-compatible hardening measure to strengthen
downgrade protections
.
However, when we shipped TLS 1.3 last year, we had to partially disable this
measure due to incompatibilities with some non-compliant TLS-terminating
proxies. Chrome currently implements the hardening measure for certificates
which chain up to known roots, but allows a bypass for certificates chaining up
to unknown roots. We intend to enable it for all connections.

Downgrade protection mitigates the security impact of the various legacy options
we retain for compatibility. This means user’s connections are more secure and,
when security vulnerabilities are discovered, it is less of a scramble to
respond to them. (That, in turn, means fewer broken sites for users down the
road.) This also aligns with RFC 8446.

Intent to Remove |
Chrome Platform Status |
Chromium Bug

Feedback

This post is also available in: English

author-avatar

About Aksel Lian

En selvstendig full stack webutvikler med en bred variasjon av kunnskaper herunder SEO, CMS, Webfotografi, Webutvikling inkl. kodespråk..