- From: Mike West <mkwst@google.com>
- Date: Wed, 5 Aug 2015 09:50:29 +0200
- To: Francois Marier <francois@mozilla.com>
- Cc: public-webappsec@w3.org
- Message-ID: <CAKXHy=fm8p1tOiWbbZjwLJqnfG146+K90TGxq6fA3cDoFmZeAA@mail.gmail.com>
This behavior is to a large extent the entire point of Referrer Policy. If we don't give sites a way around the default behavior or dropping the referrer on downgrade, they'll do it themselves via insecure redirects (e.g. 't.co'). Perhaps we could offer something like what you want as an addition (though I'm not sure I understand the use case (nor do I have a good naming suggestion)). -mike On Aug 5, 2015 04:08, "Francois Marier" <francois@mozilla.com> wrote: > Sorry if this has been discussed before, but I was reading the spec from > the point of view of what I'd like to use on my own sites by default and > realized that of the 4 non-default policy states: > > 1. no referrer > 2. origin > 3. origin when cross-origin > 4. unsafe url > > only #1 is as good as the default (no referrer when downgrade) when > looking at HTTPS to HTTP navigations. > > I wouldn't mind using "origin when cross-origin" but I don't want to > leak referrers on HTTP requests so it seems I'm stuck with the default > policy. > > Shouldn't we try to encourage more HTTPS and have all of the policies > (except for unsafe URL of course) be at least as good as the default > one? In other words, shouldn't "origin" and "origin when cross-origin" > also imply "no referrer when downgrade"? > > Francois > >
Received on Wednesday, 5 August 2015 07:51:10 UTC