-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Omit referrers on cross-origin requests from an RFC7686 address #155
Comments
Is the It looks like Mozilla's implementation doesn't allow a page's assertion of a laxer policy to override the |
That's a good question, Firefox does not ship this by default: https://searchfox.org/mozilla-central/source/modules/libpref/init/StaticPrefList.yaml#9297-9302. |
Good catch, I hadn't noticed that this wasn't ON by default in Firefox, just in the Tor Browser. I just tested this with the test page I've been using to replicate the Tor Browser behavior in Brave and Firefox doesn't touch these headers when set to use a local Tor daemon as a SOCKS5 proxy. I updated the two-implementer note on the Fetch PR accordingly. |
It seems unlikely to me that a site would rely on receiving a |
The special-use
.onion
domain name, defined in RFC7686, receives special treatment in the Tor browser and in Firefox: https://searchfox.org/mozilla-central/rev/f8576fec48d866c5f988baaf1fa8d2f8cce2a82f/dom/security/ReferrerInfo.cpp#334-339It seems like this behavior should be standardized since any browser could be setup to proxy traffic over the Tor SOCKS5 proxy.
The text was updated successfully, but these errors were encountered: