W3C home > Mailing lists > Public > public-webappsec@w3.org > August 2015

Re: [REFERRER] 3 of 4 policy states are worst than the default

From: Mike West <mkwst@google.com>
Date: Wed, 5 Aug 2015 09:50:29 +0200
Message-ID: <CAKXHy=fm8p1tOiWbbZjwLJqnfG146+K90TGxq6fA3cDoFmZeAA@mail.gmail.com>
To: Francois Marier <francois@mozilla.com>
Cc: public-webappsec@w3.org
This behavior is to a large extent the entire point of Referrer Policy. If
we don't give sites a way around the default behavior or dropping the
referrer on downgrade, they'll do it themselves via insecure redirects
(e.g. 't.co').

Perhaps we could offer something like what you want as an addition (though
I'm not sure I understand the use case (nor do I have a good naming
suggestion)).

-mike
On Aug 5, 2015 04:08, "Francois Marier" <francois@mozilla.com> wrote:

> Sorry if this has been discussed before, but I was reading the spec from
> the point of view of what I'd like to use on my own sites by default and
> realized that of the 4 non-default policy states:
>
> 1. no referrer
> 2. origin
> 3. origin when cross-origin
> 4. unsafe url
>
> only #1 is as good as the default (no referrer when downgrade) when
> looking at HTTPS to HTTP navigations.
>
> I wouldn't mind using "origin when cross-origin" but I don't want to
> leak referrers on HTTP requests so it seems I'm stuck with the default
> policy.
>
> Shouldn't we try to encourage more HTTPS and have all of the policies
> (except for unsafe URL of course) be at least as good as the default
> one? In other words, shouldn't "origin" and "origin when cross-origin"
> also imply "no referrer when downgrade"?
>
> Francois
>
>
Received on Wednesday, 5 August 2015 07:51:10 UTC

This archive was generated by hypermail 2.3.1 : Monday, 23 October 2017 14:54:14 UTC