Closed
Bug 158463
Opened 22 years ago
Closed 17 years ago
Sites use iframes to bypass third-party cookie blocking
Categories
(Core :: Networking: Cookies, defect, P2)
Tracking
()
RESOLVED
FIXED
Future
People
(Reporter: mozilla, Assigned: dwitte)
References
(Blocks 1 open bug)
Details
(Keywords: privacy, Whiteboard: [sg:want?])
The NYTimes is using doubleclick ads in Iframes to bypass "cookies from
originating web site" prefs. Is there a way to prohibit cookies except from
originating web site even in the case of frames and IFrames?
Reporter, please ALWAYS tell us your Mozilla's BuildID.
Possibly a dupe of bug 87388, bug 136135?
Comment 2•22 years ago
|
||
No, this is a losing battle. Doubleclick et al learned a long time ago that
they can easily get around this pref by doing a double redirect (puppies.com
does a redirect to doubleclick with ?puppies.com in the query string,
doubleclick is now first part and sets a cookie, then doubleclick redirects back
to the site in the query string). So plugging the iframe hole will just send
nytimes to the redirect hole which is unpluggable.
Target Milestone: --- → Future
How come? I always thought blocking happens on the protocol level, not on page
rendering level... *shrugs*
Comment 4•21 years ago
|
||
based on morse's comments here, is this WONTFIX?
Comment 5•21 years ago
|
||
No, i think this is valid.
Adding dependency to bug 187974
Depends on: 187974
Comment 6•21 years ago
|
||
Thinking about this further, how would we ever be able to distinguish between
good and bad uses of iframes? If you have an idea on this (not even code-wise,
just logic-wise) please speak up. :)
Comment 7•21 years ago
|
||
(In reply to comment #6)
> Thinking about this further, how would we ever be able to distinguish between
> good and bad uses of iframes? If you have an idea on this (not even code-wise,
> just logic-wise) please speak up. :)
Well, the main thing would be to just look at the domains. If you are at
thissiter0x0rs.org and it has an iframe from thissitesux0rs.org, then you reject
the cookie. If they are both the same site, then you accept the cookie. What am
I missing?
Comment 8•19 years ago
|
||
(In reply to comment #7)
> (In reply to comment #6)
> > Thinking about this further, how would we ever be able to distinguish between
> > good and bad uses of iframes? If you have an idea on this (not even code-wise,
> > just logic-wise) please speak up. :)
>
> Well, the main thing would be to just look at the domains. If you are at
> thissiter0x0rs.org and it has an iframe from thissitesux0rs.org, then you reject
> the cookie. If they are both the same site, then you accept the cookie. What am
> I missing?
This was similar how I suggested to Simon Fraser that we might be able to fix bug 318574 within Camino itself, and he agreed with me (the discussion was on IRC, not in that bug). Basically, when we got the request to set the cookie, we should check to see if its domain matches the domain of the page we've got in the location bar, and if not, don't allow the cookie to be set (if third-party cookies are set to be rejected in prefs), and don't even show the sheet asking about it (since, IMO, "reject third-party cookies" takes precedence over "ask me about all cookies").
cl
Comment 9•19 years ago
|
||
*** Bug 321792 has been marked as a duplicate of this bug. ***
Comment 10•18 years ago
|
||
*** Bug 342801 has been marked as a duplicate of this bug. ***
Comment 11•17 years ago
|
||
I think we should at least have a pref for this, so paranoid users can have extra privacy/CSRF protection, and so we can find out how much of the Web would break if we made this the default.
Note that now that bug 324397 is fixed, third-party cookies for things other than iframes (e.g. images and scripts) are disabled by default.
Comment 12•17 years ago
|
||
Nice to have but I wouldn't block on this - moving to the wanted list...
Flags: wanted1.9+
Flags: blocking1.9?
Flags: blocking1.9-
Comment 13•17 years ago
|
||
FWIW, this is now standard behaviour on IE7 and Safari, putting us at a slight disadvantage when it comes to privacy, and a severe one when it comes to messaging about privacy.
Comment 14•17 years ago
|
||
Moving back to blocking list so we don't lose track..
Flags: blocking1.9- → blocking1.9+
Priority: -- → P2
Assignee | ||
Comment 15•17 years ago
|
||
seems comical that this is assigned to morse, let's fix that.
Assignee: morse → nobody
QA Contact: tever → networking.cookies
Assignee | ||
Comment 16•17 years ago
|
||
-> me, though i won't be able to look at this for at least a week.
Assignee: nobody → dwitte
Assignee | ||
Comment 17•17 years ago
|
||
so, it turns out our current third party blocking feature takes care of this - see bug 417286 comment 14. we won't be doing this by default, though, because of the trouble it causes.
please reopen if there are specific circumstances relating to iframes where this feature fails.
Status: NEW → RESOLVED
Closed: 17 years ago
Resolution: --- → WORKSFORME
Assignee | ||
Comment 18•17 years ago
|
||
alas, i spoke too soon. our current code does correctly handle the first request pertaining to an iframe (when it's first constructed and loaded), but nsHttpChannel (and/or friends) doesn't set the originating URI properly for subsequent requests. (i discovered this using Mardak's neat testcase in bug 219157 comment 13.)
while we may be able to fix netwerk to handle this right, a more robust solution would be to have cookies start from the nsIChannel it's given, walk up the docshell tree to find the toplevel content window, and then grab the URI off that. this is similar to what we do for mailnews detection; see http://bonsai.mozilla.org/cvsblame.cgi?file=/mozilla/extensions/cookie/nsCookiePermission.cpp&rev=1.21&mark=210-242#206). of course, doing this would require some interface abstraction/rejiggering, since netwerk can't depend on docshell. this interface problem is also somewhat related to bug 187974.
i have a dirty patch that kinda works, but the above problems need to be solved.
Status: RESOLVED → REOPENED
Resolution: WORKSFORME → ---
Assignee | ||
Updated•17 years ago
|
Summary: Sites Use IFrames to Bypass Cookie Prefs → Sites use iframes to bypass third-party cookie blocking
Updated•17 years ago
|
Flags: tracking1.9+ → wanted-next+
Assignee | ||
Comment 19•17 years ago
|
||
fixed per bug 421494.
Status: REOPENED → RESOLVED
Closed: 17 years ago → 17 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•