NEW 228324
Investigate removing Referrer in all HTTPS -> HTTP cases
https://bugs.webkit.org/show_bug.cgi?id=228324
Summary Investigate removing Referrer in all HTTPS -> HTTP cases
Sam Sneddon [:gsnedders]
Reported 2021-07-27 08:03:41 PDT
While less useful in the short term due to SNI providing leakage of the cross-site origin anyway, once ECH has more support the only data available to a passive monitor is the IP address of the secure origin; as such, at that point, it would become a big shame to then be leaking it through the Referer header when navigating to an insecure origin. This doesn't happen by default on ToT, given the Referrer-Policy default of strict-origin-when-cross-origin means we don't send a Referer in the HTTPS -> HTTP case anyway, but we should probably investigate making all the Referrer-Policy behave like this. (See Bug 228323, which is related insofar as it suggests overriding the policy in other ways.)
Attachments
Radar WebKit Bug Importer
Comment 1 2021-07-28 04:03:24 PDT
Note You need to log in before you can comment on or make changes to this bug.