Adding domains to permissions to bypass content blocking doesn't always work
Categories
(WebExtensions :: General, defect, P1)
Tracking
(firefox64 wontfix, firefox65+ wontfix, firefox66+ verified)
People
(Reporter: mkaply, Assigned: ehsan.akhgari)
References
Details
Attachments
(1 file)
| Reporter | ||
Updated•7 years ago
|
Comment 1•7 years ago
|
||
| Reporter | ||
Comment 2•7 years ago
|
||
Comment 3•7 years ago
|
||
Comment 4•7 years ago
|
||
| Reporter | ||
Comment 5•7 years ago
|
||
Comment 6•7 years ago
|
||
| Reporter | ||
Comment 7•7 years ago
|
||
Comment 8•7 years ago
|
||
| Reporter | ||
Comment 9•7 years ago
|
||
Comment 10•7 years ago
|
||
| Reporter | ||
Comment 11•7 years ago
|
||
Comment 12•7 years ago
|
||
Comment 13•7 years ago
|
||
| Assignee | ||
Comment 14•7 years ago
|
||
| Assignee | ||
Comment 15•7 years ago
|
||
Comment 16•7 years ago
|
||
Comment 17•7 years ago
|
||
| Assignee | ||
Comment 18•7 years ago
|
||
Comment 19•7 years ago
|
||
| Assignee | ||
Comment 20•7 years ago
|
||
| Assignee | ||
Comment 21•7 years ago
|
||
| Assignee | ||
Comment 22•7 years ago
|
||
| Assignee | ||
Comment 23•7 years ago
|
||
Comment 24•7 years ago
|
||
| Assignee | ||
Comment 25•7 years ago
|
||
Comment 26•7 years ago
|
||
Updated•7 years ago
|
Updated•7 years ago
|
Updated•7 years ago
|
Comment 27•7 years ago
|
||
| Assignee | ||
Comment 28•7 years ago
|
||
Comment 29•7 years ago
|
||
| Assignee | ||
Comment 30•7 years ago
|
||
| Reporter | ||
Comment 31•7 years ago
|
||
| Reporter | ||
Comment 32•7 years ago
|
||
Comment 33•7 years ago
|
||
Kris, we're about a week away from the first 65 RC builds. What can we do to get this bug moving again?
| Assignee | ||
Comment 34•7 years ago
|
||
Shane, any ideas how we can make progress here? I've been waiting on comment 30 for about three weeks now. :-) We're almost out of time for doing anything for 65 here.
Comment 35•7 years ago
|
||
ISTM that the patch fixes what we were trying to do before and we should just get it in, the followup with something better if necessary. But if Kris has some concerns here, he should be giving the feedback.
Comment 36•7 years ago
|
||
(In reply to Shane Caraveo (:mixedpuppy) from comment #35)
ISTM that the patch fixes what we were trying
By that I mean the original approach.
| Assignee | ||
Comment 37•7 years ago
|
||
I'd really like Kris to weigh in I think...
Comment 38•7 years ago
•
|
||
(In reply to :Ehsan Akhgari from comment #30)
Hmm, do you mind laying out a set of steps which would allow the first
approach to be abused? The effective outcome of both patches (I think)
should be exactly the same, in that inside a moz-extension:// frame from the
extension in comment 0, any amazon content with any level of nesting will be
able to load successfully and set tracking cookies in the user's profile...
So, essentially, I'm imagining something like this:
Extension has host permissions ["*://*.amazon.com/", "*://*.facebook.com/"].
It loads Amazon.com into a frame.
With your suggested approach of using the extension's privileges to determine what Amazon is allowed to load, a Facebook resource loaded into an Amazon product page would be allowed to load without tracking protection, and link the product page view to the user's Facebook identity.
With my suggested approach of treating the Amazon frame as if it were the top-level document, the Facebook frame would load the same way as it would in an Amazon tab, as an isolated third-party resource, with at least some protection against linking the load to the user's identity.
| Assignee | ||
Comment 39•7 years ago
|
||
OK, I'll see what I can do to work around the issue in comment 28.
I doubt the patch is gonna be possible to backport to 65 at this point unfortunately, it'll be too big and too risky.
| Assignee | ||
Updated•7 years ago
|
| Assignee | ||
Comment 40•7 years ago
|
||
New version of the patch is on phabricator for review.
Comment 41•7 years ago
|
||
(Trying to keep track of what to communicate to strategic partnerships about this) Ehsan -- I assume that the workaround from the extension point of view (regardless of the patch particulars) would be the same: they'd indicate the discrete domains for host permissions?
| Assignee | ||
Comment 42•7 years ago
|
||
That's right. Note that they need to indicate all such domains. For example, the set of domains mentioned in comment 0 were insufficient to make the use case in that comment work correctly, rather the set of domains in comment 23 seems to do the job. Presumably this extension would need to declare all domains that various regional Amazon websites (the site that gets embedded in the panel) can use.
Comment 43•7 years ago
|
||
Thanks. Wanted to make sure we weren't introducing potential use of wildcards for this.
Comment 44•7 years ago
|
||
Ehsan and I both agree that it's too late to fix this in 65.
Comment 45•7 years ago
|
||
| Assignee | ||
Comment 46•7 years ago
|
||
I'd appreciate if someone (other than myself) could test whether the fix works for the original use case once the patch hits Nightly. I did test this locally but this was a rather complex change so another round of manual testing to ensure the Amazon Assistant extension now works as expected would be much appreciated.
Comment 48•7 years ago
|
||
| bugherder | ||
| Reporter | ||
Comment 49•7 years ago
|
||
This does appear to fix it. I only had to add "https://horizonte.browserapps.amazon.fr/"
to permissions and connecting to the French site worked.
| Assignee | ||
Comment 50•7 years ago
|
||
Great, thanks for testing!
Comment 51•6 years ago
|
||
Verified using windows 10 x64 bit using both the latest Nightly and 66. The issue was no longer reproducible on these versions, console was not showing any blocked items after adding the domains from the description.
Description
•