Closed Bug 1755832 Opened 3 years ago Closed 3 years ago

privacy.resistFingerprinting=true breaks netflix

Categories

(Core :: Audio/Video: Playback, defect)

Firefox 97
defect

Tracking

()

RESOLVED DUPLICATE of bug 1610762

People

(Reporter: gdonval+github, Unassigned)

References

(Blocks 1 open bug)

Details

User Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0

Steps to reproduce:

Go to netflix.com (without the netflix1080 extension please). Try to watch a video.

Actual results:

Video did not play: Pardon the interruption screen.

Error code: F7121-1331

Expected results:

Video should have played.

Couple more details:

  • The user agent reported in the bug report is obviously with resistFingerprinting on.
  • Setting resistFingerprinting off and reloading Netflix solves the problem.
  • Using the netflix 1080p extension solves the problem.

It looks like that specific error code is related to the browser being deemed "too old" by Netflix (that's the second website telling me this this month).

Considering these data, it would seem it would make sense to support another UA version: there would be the ESR (as usual, default) and a boolean to swap to whichever "current" version makes sense (probably the previous one, so v96 in Firefox v97). Alternatively, there could be a whitelist whose purpose is only to pass through the correct version of Firefox (and not disable everything at once).

The Bugbug bot thinks this bug should belong to the 'Core::Audio/Video: Playback' component, and is moving the bug to that component. Please revert this change in case you think the bot is wrong.

Component: Untriaged → Audio/Video: Playback
Product: Firefox → Core

This is a known issue: https://github.com/arkenfox/user.js/issues/1321#issuecomment-1013827315

It hasn't been acted upon because it fixing it diverges from Tor Browser and we haven't really considered how we want to handle this case.

It's not the version, it is mismatching the OS in the HTTP Header

  • you can read some of the hi-jinks going on in here and the initial mis-diagnosis re v100- https://github.com/webcompat/web-bugs/issues/82913
  • that's not to say that if/when FIrefox RFP diverges from TB's RFP (behind a pref) that dropping the version spoof shouldn't also be done
    • and that would solve AMO's website extension compat issues such as being able to get or even search for Multi-Account Containers (requires FF94+) and other potential website issues over versions vs feature detection

privacy.resistFingerprinting.tbmode.enabled (default true: Tor Project can easily flip it)

  • if true don't spoof version number
  • if true only reduce HTTP Header OS to four tuples (not two)

^ tbmode.enabled (default true)

Ugh, I meant default false and when false do x,y,z

Status: UNCONFIRMED → RESOLVED
Closed: 3 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.