Closed
Bug 1896691
Opened 1 year ago
Closed 7 months ago
Detect https upgrade/downgrade redirect loops of JS and HTML meta redirects during downgrade, not upgrade.
Categories
(Core :: DOM: Security, task, P4)
Core
DOM: Security
Tracking
()
RESOLVED
WONTFIX
People
(Reporter: manuel, Unassigned)
References
(Blocks 1 open bug)
Details
(Whiteboard: [domsecurity-backlog2])
This allows us to differentiate the first upgrade from the second one without relying on triggeringPrincipal. Simplifying the UpgradeDowngrade loop detection check. Follow up on Bug 1747230.
Likely done in DocumentLoadListener::OpenDocument. Pernosco session recording paths the redirects take: https://pernos.co/debug/0W0zGcI9dasXSFSs8XTF5g/index.html
Updated•1 year ago
|
Blocks: https-first-mode
Updated•1 year ago
|
Severity: -- → N/A
Whiteboard: [domsecurity-backlog2]
Updated•8 months ago
|
Priority: -- → P4
Updated•7 months ago
|
Status: NEW → RESOLVED
Closed: 7 months ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•