-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
reminder: tighten cross origin referers #1077
Comments
Hi. I'm kinda "forced" to use Smart Referer plus I want to ask, is there any benefit to set Thank you and sorry if I just asked something incredibly dumb. EDIT: actually, I don't even know if I'm allowed to ask this here, sorry again if I'm breaking some rules. |
Depends on how you configured Smart Referer (I've never used it, so I'm not familiar with changing the default origin-destination rules). If you're effectively |
|
I guess Umatrix 'Spoof referrer' also does the same thing in a less granular level. right ? |
I used to just use uMatrix's checkbox: but have since pared back anything in uM to the bare minimum in anticipation of one day dropping it: pretty sure I can cover everything it does in other ways such as prefs (but I'll probably use it until it breaks or becomes a liability) from the extension (emphasis + italics mine)
from the wiki
If I read that correctly - when you request a resource, the referer will always be the same as the resource - which is not what the Firefox prefs do. FF only trims it etc, it doesn't change it. But of course, with Firefox at |
I think 0+2 would be more like what Safari does but tightening our settings to 2+2 probably shouldn't cause much more breakage than what we currently have |
think 0+2 would be more like what Safari does but tightening our settings to 2+2 probably shouldn't cause much more breakage than what we currently have
I use 2 + 2 for many years. The only case I have experienced breakage was OpenStreetMap forum that tracked referers within same website in an attempt to detect bots.
|
Login to |
resistFingerprinting only breaks the login part though, right? it was like that pornhub one or something? edit: if I remember rightly the pornhub was solved (a timing thing) and that let icloud's error also get fixed, but icloud then still had something else blocking it? Is there a ticket for the icloud login failing with RFP? |
ahh that's right .. see comment 14 |
This comment has been minimized.
This comment has been minimized.
Oh... and RFP was not the point here, it was |
I don't see a point having Cheers |
@crssi with XOriginPolicy at 2, the trimming of 1604=2 only happens in very rare cases, namely if the scheme or the port changes but on the same host. Any request on the same scheme+host+port will still get the untrimmed referrer because those requests are not cross-origin. So I don't think 1604=2 should cause that much more breakage but it's a good value to have because it will leak a bit less information if someone relaxes 1603. |
Doh... I had a very important typo in my prevous post... did a correction now. Cheers |
Just so you know this breaks popular stuff like Pixiv, might add note to comment |
@Kein
|
I can login to iCloud with In my experience, you will won't be able to login to (I don't use Firefox's |
ATM the only site that I know (and it is not important, at least for me) is In the past, but way ago, there were problems, but now... not anymore. Do you have any samples? |
current
Hmmm ... the "harden it a bit" line seems weird, it's already at 1: probably a left-over from recommending extensions as an option
I think we can actually change these to 2 and 2 based on Safari
source
see this blog which indicates the "Origin-Only Referrer For All Third-Party Requests" as being implemented since Dec 2019
--
and here
--
and here
If Safari can tighten it, then I'm pretty sure that SFA (sweet F all) would break. Currently we're at
1 + 0
which is OK'ish but not brilliant. Personally I've been at2 + 2
for the last several years with no breakage, but I'm not atypicalAnyone want to chip in with their thoughts?
The text was updated successfully, but these errors were encountered: