Skip to content

Commit

Permalink
Merge pull request #553 from nodiscc/doc-xorigin-breakage
Browse files Browse the repository at this point in the history
doc: add notice about network.http.referer.XOriginPolicy = 2 breaking some login flows
  • Loading branch information
pyllyukko committed Feb 12, 2024
2 parents 342966a + 109d53a commit e96a6e3
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 1 deletion.
3 changes: 2 additions & 1 deletion README.md
Expand Up @@ -301,7 +301,7 @@ HTTP protocol related entries. This affects cookies, the user agent, referer and
* Enable CSP 1.1 script-nonce directive support [ [1](https://bugzilla.mozilla.org/show_bug.cgi?id=855326) ]
* Enable Content Security Policy (CSP) [ [1](https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy) [2](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) ]
* Enable Subresource Integrity [ [1](https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity) [2](https://wiki.mozilla.org/Security/Subresource_Integrity) ]
* Don't send referer headers when following links across different domains [ [1](https://github.com/pyllyukko/user.js/issues/227) [2](https://github.com/pyllyukko/user.js/issues/328) [3](https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/) ]
* Don't send referer headers when following links across different domains [ [1](https://github.com/pyllyukko/user.js/issues/227) [2](https://github.com/pyllyukko/user.js/issues/328) [3](https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/) [4](https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks) ]
* Accept Only 1st Party Cookies [ [1](http://kb.mozillazine.org/Network.cookie.cookieBehavior#1) ]
* Enable first-party isolation [ [1](https://bugzilla.mozilla.org/show_bug.cgi?id=1299996) [2](https://bugzilla.mozilla.org/show_bug.cgi?id=1260931) [3](https://wiki.mozilla.org/Security/FirstPartyIsolation) ]
* Make sure that third-party cookies (if enabled) never persist beyond the session. [ [1](https://feeding.cloud.geek.nz/posts/tweaking-cookies-for-privacy-in-firefox/) [2](http://kb.mozillazine.org/Network.cookie.thirdparty.sessionOnly) [3](https://developer.mozilla.org/en-US/docs/Cookies_Preferences_in_Mozilla#network.cookie.thirdparty.sessionOnly) ]
Expand Down Expand Up @@ -457,6 +457,7 @@ Hardening your often implies a trade-off with ease-of-use and comes with reduced
* Fully automatic updates are disabled and left to package management systems on Linux. Windows users may want to change this setting.
* Update check page might incorrectly report Firefox ESR as out-of-date
* Do No Track must be enabled manually
* Blocking referers across same eTLD sites breaks some login flows relying on them, consider lowering this pref to 1
* Blocking 3rd-party cookies breaks a number of payment gateways
* First-party isolation breaks Microsoft Teams
* First-party isolation causes HTTP basic auth to ask for credentials for every new tab (see #425)
Expand Down
2 changes: 2 additions & 0 deletions user.js
Expand Up @@ -759,6 +759,8 @@ user_pref("security.sri.enable", true);
// https://github.com/pyllyukko/user.js/issues/227
// https://github.com/pyllyukko/user.js/issues/328
// https://feeding.cloud.geek.nz/posts/tweaking-referrer-for-privacy-in-firefox/
// https://wiki.mozilla.org/Privacy/Privacy_Task_Force/firefox_about_config_privacy_tweeks
// NOTICE: Blocking referers across same eTLD sites breaks some login flows relying on them, consider lowering this pref to 1
user_pref("network.http.referer.XOriginPolicy", 2);

// PREF: Accept Only 1st Party Cookies
Expand Down

0 comments on commit e96a6e3

Please sign in to comment.