Third Party Developers
The ForceNetworkInProcess will be removed soon. The official announcement will start from Chrome Enterprise release notes for Chrome 80. The original plan was to remove it at Chrome 82, but will be postponed to do it at Chrome 84.
At Google, we believe that if we focus on the user, all else will follow. In our Software Principles, we provided general recommendations for software that delivers a great user experience. This policy expands upon those general recommendations by defining third party software, and clarifying how it will be treated by Chrome. Software that meets the definition is considered as potentially harmful to the Chrome user experience, and we will take steps to prevent such software from injecting itself into Chrome’s process space. It steps beyond this simple definition to lay guidelines for our interactions with third party software developers, and our commitment to helping them as well as the ecosystem in general.
This policy was initially announced in November of 2017 via this blog post.
Any module that is not signed by Microsoft or Google is considered to be third party software.
Software that is produced by third parties but that is signed by Microsoft via their WHQL program is not considered third party software under this definition. This is intended, and required for hardware support in some cases.
Software should stay out of Chrome’s address space. Period.
The intent of this policy is take a stance against third party code injecting into Chrome’s processes, for any reason.
Software that is deemed critical to the ecosystem or to certain end users may be excluded from being blocked.
The third party blocking mechanism will have provision to allow (at least temporarily) acceptable third party software. This is primarily intended to allow accessibility software to continue to work with Chrome. This may be extended to other classes of software at Google’s discretion to include other modules that would otherwise be considered third party. Exceptions should be considered as temporary, and are intended to allow the developer sufficient time to develop alternative solutions that do not violate this policy.
Where no viable alternative to code injection exists for a legitimate use case that provides concrete value to users, Chrome is committed to developing and/or implementing alternative mechanisms that does not require code injection.
This may include working with specific publishers, developers, industry steering groups or standards bodies. We are generally convinced that most legitimate use cases can be addressed via existing platform and extension APIs, but are willing to consider supporting new APIs where there is a clear and justified use case.
Where long term support of a legacy injection mechanism is required to enable a valid exceptional use case we will make efforts to move the logic to an external utility process so that the injection does not need to occur in the Chrome browser process. For more information refer to the FAQ for questions around printing, shell extensions and AMSI implementations.
Developers should be notified that their software will start to be blocked, and provided a reasonable period of time during which they may develop alternative solutions.
The overall third party strategy includes a relatively lengthy notification-only period, during which time we will make all efforts to directly engage with developers of third party software with non-trivial user bases. This will also include direct communication with the community via blog posts and other means.
Developers should have a mechanism for escalating their particular use case.
It is very likely that there is a long tail of use cases that we have not considered. If a developer feels they have a use case that is not easily addressed using alternative APIs or known workarounds they can feel free to reach out to the team by filing a bug. You can also reach out to the team on the firstname.lastname@example.org mailing list.
Q. How can I determine how this feature impacts my software?
A. We have provided testing documentation that walks you through the process of evaluating the impact of blocking on your software.
Q. Can my software be added to the allowlist?
A. The short answer is no. Unless you are a publisher of accessibility software, in which case we will happily allow your software until suitable alternative APIs are available. Please file a bug!
Q. What about shell extensions?
A. For the time being we are warning about shell extensions that inject, and blocking them when possible. We realize that this is less than ideal given that most shell extensions injection innocently. We are actively moving all file dialog code to an external utility process where injection will be allowed. As of November 2018 this is being experimented with.
Q. What about printing?
A. Chrome will allow software to inject as part of the printing stack, and will not warn about modules that are injected during printing. We are actively working to move printing to an external utility process so that this injection will no longer incur in the browser process.
Q. What about IME?
A. Currenty Chrome will allow registered IME modules to inject so as to break alternative text entry systems. Chrome is moving towards TSF rather than IMM32. Eventually IMM32 will be deprecated, and these modules will no longer be allowed to inject.
Q. What about Win32 event hooks?
A. On Windows 8 and above we will be blocking event hooks (and other legacy injection mechanisms) from injecting into the browser process using the PROCESS_CREATION_MITIGATION_POLICY_EXTENSION_POINT_DISABLE_ALWAYS_ON mitigation policy. Note that there is ongoing work to move window management and input to an external UI process. We will be evaluating whether or not to bring this technology to the windows platform, and if we do, whether or not to allow legacy injection in this process as part of that work.
Q. What about AMSI providers?
A. AMSI providers are currently allowed to inject into Chrome, and no warning or blocking will apply. They are invoked when downloaded files are scanned using IAttachmentExecute (and also in some other situations, for example, by some printer drivers), which is used to enable Mark of the Web support on the Windows platform. This scanning is being moved to a utility process so that the injection will no longer incur in the browser process.
Q. What about [feature or use case X]?
A. Our general advice is to stop injecting into Chrome, and to seek alternative mechanisms that use some combination of modern APIs, external processes, Chrome extensions and native messaging.
Q. What about enterprise use cases?
A. We maintain an enterprise policy for specifically allowing third party injection, and a companion policy for controlling whether or not Chromium's network stack is in the main browser process. These policies will be supported for at minimum the calendar year 2019, and 6 months (4 Chromium versions) notice will be provided prior to removing them. Notice will be provided on this page, as well as via the enterprise release notes for the affected release.