-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expose the first party to a partitioned third party #14
Comments
There are two plausible places to consider exposing this:
If the top page has a referrer policy that indicates it doesn't want to reveal its domain to subresources, then we could still indicate that storage is partitioned, but report explicitly that the partitioning key is unavailable. |
@hober I wonder if this should be part of the storage access standard in some way? (And eventually HTML I suppose?) |
There was some further discussion during the F2F both on the call and on Slack:
|
Re. (1)(iii), I would prefer to attack the threat by focusing on recognizing the user across sites, of course! Removing 3p cookies isn't the end of the story, obviously, but the point of doing so is to relax the need for this kind of privacy protection. Since this is a threat only when there's a widely-embedded party that is transitively but not directly embedded — i.e. it's often a C but rarely a B — perhaps the kind of targeted anti-circumvention scrutiny mentioned in https://wiki.mozilla.org/Security/Anti_tracking_policy#Policy_circumvention is a useful tool. |
I agree that being able to identify the user to some approximation is the root cause problem, but tackling that is involved and only Tor currently has taken significant steps toward that, which don't really seem feasible to adopt for other browsers. Why not flip it and only leak A to B, unless A set a referrer policy that would prohibit that? |
I agree that's a feasible option as well. Whether or not we should by-default reveal A to C has to do with a judgement call about the utility of the use cases it would support:
|
There's also a significant risk with giving the server the partition key, in that it makes it easier for the server to tie seemingly unrelated sessions together. I'd like a much clearer understanding of what problems Safari ran into (or what problems you foresee) as conceptually it would seem that servers would have to see these as completely distinct sessions. (I think it's correct that there are legitimate reasons to have this information, but to me they do not outweigh the potential harm toward end users.) |
Sorry, wait, I don't understand that. If we're talking about a third party which has partitioned cookies or storage available, then they could certainly tie together all the different requests that come from the same partition — it suffices to store a random number. What am I missing? |
Ah, I meant across partitions. It was basically restating the concern from the perspective of the third-party server. |
Got it. I totally agree, if we're talking about third parties that are colluding with the first parties they are embedded in! But this A->B->C scenario is for third parties that don't have that cooperation from the first party. At that point, how does identifying the first-party site help the third party track across partitions? |
By being a pretty significant data point about user activity and behavior. |
During the CG meeting there was a question whether the first party location should be exposed to third parties (both via HTTP and JavaScript). And some agreement that it might make sense, modulo referrer policy.
The text was updated successfully, but these errors were encountered: