Consider how Referrer from Refresh affects ETP.
Categories
(Core :: Privacy: Anti-Tracking, enhancement)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox135 | --- | fixed |
People
(Reporter: zrhoffman, Assigned: zrhoffman)
References
Details
Attachments
(1 file)
As described in bug 1479017 and its linked webcompat report, Firefox not sending a referrer from a <meta> refresh or HTTP Refresh header is a webcompat issue.
However, fixing this issue will include sending a referrer in a new place that Fx previously did not, which could be a tracking issue.
Once sending a referrer from refreshes is implemented behind a pref in bug 266554, it should be easier to evaluate what is needed, with respect to tracking protection, in order to enable it by default (bug 1928290, bug 1928291).
| Assignee | ||
Comment 1•1 year ago
|
||
Hi Tim, for awhile <https://github.com/mozilla/gecko-dev/commit/74bfd1dd41f#diff-e570c28d01a02f86725b88999035c7a9ff8d86185c203c364b1be0584c6d1a7bR6981-R6982> Fx has intentionally not sent a referrer when navigating from <meta> refreshes or the Refresh header, and there have been efforts over the years <https://phabricator.services.mozilla.com/D35810> to keep that referrer hidden.
But as noted in bug 1479017 comment 4, not sending a referrer with Refresh breaks the expectations of a major site, so (currently-disabled) pref network.http.referer.sendFromRefresh was added to enable that functionality in bug 266554.
Is any tracking mitigation needed before network.http.referer.sendFromRefresh is enabled by default in bug 1928291? WDYT?
Comment 2•1 year ago
|
||
Per Bug 1479017 comment 2, it makes sense to send a referer header in this case. For tracking mitigation, we have enforced the strict-origin-when-cross-origin referrer policy for cross-site requests, which covers the case here. So, I think we don't need extra protection here.
But we might want to have a test to ensure the protection is still working for meta refresh cases. Note that we don't enforce the top-level navigations due to webcompat reasons.
| Assignee | ||
Comment 3•1 year ago
|
||
This only tests cross-site refreshes in an iframe. Tracking protection
is not applied to top-level cross-site refreshes, but that is
intentional for webcompat reasons.
Updated•1 year ago
|
| Assignee | ||
Comment 4•1 year ago
|
||
(In reply to Tim Huang[:timhuang] from comment #2)
Per Bug 1479017 comment 2, it makes sense to send a referer header in this case. For tracking mitigation, we have enforced the
strict-origin-when-cross-originreferrer policy for cross-site requests, which covers the case here. So, I think we don't need extra protection here.But we might want to have a test to ensure the protection is still working for meta refresh cases.
Sure! A patch to test the protection with meta refreshes is in revision https://phabricator.services.mozilla.com/D230033.
Note that we don't enforce the top-level navigations due to webcompat reasons.
Thanks for explaining this, I noticed that top-level cross-site refreshes can use any referrer policy, and I was previously unsure if they should be more protected than other top-level navigations.
Description
•