Bypasses found for Firefox Tracking Protection
Categories
(Toolkit :: Safe Browsing, defect, P3)
Tracking
()
Tracking | Status | |
---|---|---|
firefox80 | --- | fixed |
People
(Reporter: gertjan.franken, Assigned: dimi)
References
(Blocks 2 open bugs)
Details
(Keywords: sec-other, Whiteboard: tp-leak [adv-main80-])
Attachments
(3 files)
Updated•7 years ago
|
Comment 1•7 years ago
|
||
Updated•7 years ago
|
Updated•7 years ago
|
Comment 2•7 years ago
|
||
Updated•6 years ago
|
Comment 3•6 years ago
|
||
Updated•6 years ago
|
Hi, I've done a retrospective analysis of Firefox versions, up until Firefox 76. All issues discussed in the original report appear to be resolved, except for one; the request initiated by the WebSocket API is not blocked by Tracking Protection when directed to a blacklisted domain.
This can be reproduced by simply using the following code to instantiate a WebSocket:
var socket = new WebSocket('https://tracking-domain.com');
Third-party cookies are included in this a request.
Assignee | ||
Comment 5•5 years ago
|
||
loads in appcache doesn't have a top-level window, use loading principal
instead.
Depends on D80185
Assignee | ||
Comment 6•5 years ago
|
||
Depends on D80186
Updated•5 years ago
|
Updated•5 years ago
|
Comment 8•5 years ago
|
||
Backed out for perma failures.
Log: https://treeherder.mozilla.org/logviewer.html#/jobs?job_id=309133049&repo=autoland&lineNumber=6475
Backout: https://hg.mozilla.org/integration/autoland/rev/5bb8de53b2ac112dccb3b2d85b1958223c20fd39
Comment 10•5 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/aecde048367e
https://hg.mozilla.org/mozilla-central/rev/ce29017fe754
Assignee | ||
Updated•5 years ago
|
Updated•4 years ago
|
Description
•