HTTPUserAgent RFPTarget still active with Tracking Protection disabled
Categories
(Core :: Privacy: Anti-Tracking, defect, P3)
Tracking
()
People
(Reporter: ke5trel, Assigned: timhuang)
References
(Blocks 1 open bug, Regressed 1 open bug)
Details
(Whiteboard: [fpp:m7])
Attachments
(3 files)
STR:
- Enable FPP with all RFPTargets on latest Nightly 118.0a1 on Ubuntu 23.04.
privacy.fingerprintingProtection = true
privacy.fingerprintingProtection.overrides = +AllTargets - Visit https://browserleaks.com/ip.
- Disable Enhanced Tracking Protection (ETP) for the site.
Expected:
Real useragent.
Actual:
Useragent reports as "Windows NT 10.0" instead of Linux.
HTTPUserAgent RFPTarget appears to still be active despite FPP being disabled via ETP. Other RFPTargets appear to be correctly disabled, including NavigatorUserAgent.
| Assignee | ||
Updated•2 years ago
|
| Assignee | ||
Updated•2 years ago
|
Updated•2 years ago
|
| Assignee | ||
Comment 1•1 year ago
|
||
The userAgent was decided when the channel was created, but the channel
hasn't known about whehter it should exempt fingerprinting protection at
the moment. To properly set the userAgent, we need to update the
userAgent header once we know the AntiTracking info.
Comment 3•1 year ago
•
|
||
Backed out for causing multiple failures
Failure log 1 // Failure log 2 // Failure log 3 // Failure log 4
Updated•1 year ago
|
| Assignee | ||
Comment 4•1 year ago
|
||
The userAgent header can be modified in several ways, such as using the
header field to set a custom userAgent header for a fetch request. We
want to preserve the custom header, so we shouldn't recalculate the
userAgent header if it's been overridden after the channel was created.
Otherwise, the custom header won't work.
Depends on D196953
| Assignee | ||
Updated•1 year ago
|
| Assignee | ||
Updated•1 year ago
|
Comment 8•1 year ago
|
||
| bugherder | ||
https://hg.mozilla.org/mozilla-central/rev/6c096a3d29c7
https://hg.mozilla.org/mozilla-central/rev/15f43f43c82c
Updated•1 year ago
|
Comment 9•1 year ago
|
||
We have received a WebCompat regression report caused by this patch. I've linked it in the see-also field for now, but I'm not going to file a regression bug for this. As I explained in more detail in this comment, this looks like some server-side fingerprinting going horribly wrong, and unless we have evidence of this breaking more than this one site, let's try the outreach route first. I'm leaving this comment here so that if we run into this regression again, the person doing the analysis there will have a better time. :)
Description
•