*Summary*: With Enhanced Tracking Protection gradually rolling out to our
users on the release channel, we are limiting the ability of third-party
trackers to store unique client identifiers on the user's device in order
to capture a history of their browsing across different sites.  However we
are still leaking important browsing history data to these trackers in the
Referer header, which may still be tied to the user through identifiers
such as the IP address which may be stable for some users.  It is well
known that the Referer header can contain a lot of sensitive information
such as the user's search query, their user ID on various sites, and so on.

In 2017 we did a study <
https://blog.mozilla.org/data/2018/01/26/improving-privacy-without-breaking-the-web/>
on measuring the breakage impact of a number of privacy features including
limiting the Referer data sent to third-parties to origin only, and
discovered very low breakage impact from doing so.  Since then, we have
modified the default referrer policy for all third-parties in private
browsing mode with great results in terms of web compatibility.

This intent is sent to experiment with applying the same idea to
third-party tracking resources when Enhanced Tracking Protection is turned
on, through setting a default referrer policy of
strict-origin-when-cross-origin on them.  We'd like to get some early
testing by enabling this feature on the Nightly channel in the next cycle.

*Bug*: This feature landed in
https://bugzilla.mozilla.org/show_bug.cgi?id=1530076, and
https://bugzilla.mozilla.org/show_bug.cgi?id=1533763 has been filed to
enable it on Nightly.  The intention is to enable it on normal windows,
since in private windows all third-party content already has this
restriction applied to it.
*Link to standard*: https://github.com/whatwg/fetch/issues/879
*Platform coverage*: Everywhere.
*Estimated or target release*: It is unclear as of yet, we are still in
early exploration phase for this feature,
*Preference behind which this will be implemented*:
network.http.referer.defaultPolicy.trackers and
network.http.referer.defaultPolicy.trackers.pbmode, available for testing
in Nightly right now.  I'm proposing to set the value of the former pref to
2 on Nightly.
*Is this feature enabled by default in sandboxed iframes?* If not, is there
a proposed sandbox flag to enable it? If allowed, does it preserve the
current i

Please link to the test suite. If any part of the feature is not tested by
web-platform-tests, please include links to one or more of:

   - A web-platform-tests issue explaining why a certain thing cannot be
   tested (example <https://github.com/w3c/web-platform-tests/issues/3867>).
   - A spec issue for some change that would make it possible to test (
   example <https://github.com/whatwg/fullscreen/issues/70>).
   - A Bugzilla bug for the creating web-platform-tests.

nvariants in terms of what sandboxed iframes can do? I'm proposing to
enable this feature in sandboxed iframes by default.  It will preserve the
current invariants.
*DevTools bug*: No specific bug, since devtools already supports showing
the referrer policy applied to each network resource in the network
monitor, as well as the individual Referer headers sent alongside each
request, of course.
*Do other browser engines implement this?* Safari shipped this for origins
with tracking capabilities since some point last year with their ITP 2.0
release (https://webkit.org/blog/8311/intelligent-tracking-prevention-2-0/).
Firefox has shipped this for third-party origins in private windows since
Firefox 59.
*web-platform-tests*: https://bugzilla.mozilla.org/show_bug.cgi?id=1533825
is filed to track adding them.

*Is this feature restricted to secure contexts?* It's not. This
intervention is performed for protecting the user's privacy and the same
argument applies for non-secure contexts as well. Also, Referer headers
sent over non-secure contexts would be visible to network MITM attackers so
arguably protecting them is even more valuable than protecting the secure
context ones.
Please let me know if you have any questions or concerns.

Cheers,
-- 
Ehsan
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to