-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sec-Fetch-Site for navigations from outside the browser #77
Comments
The way I see it this mainly relates to |
tl;dr I'm fairly sure Chrome's behavior is intentional in this case. The idea behind the I can see the argument that it's safer for the browser to send If we want to address this in a more principled way, we could take an approach similar to what we did for extensions in #47 (comment) where we annotate the request with some information that lets a website distinguish between web-initiated and extension-initiated requests (in this case, by using an |
BTW, the spec does touch upon this in the last example:
I.e. if dragging from another application sends |
"touch upon" isn't the same as "specifies", and "may be appropriate" clearly implies it might NOT be appropriate. 😃 I agree that there are many apps that I'd trust to open links without shenanigans. There are also clearly malicious cases where the link could be as deceptive as any "web" link -- particularly in mail, chat apps, and those emailed document attachments we keep telling people not to open but they clearly do anyway. Even more so on mobile where just about every popular website pushes you to use their app instead. I don't mind losing the argument for what the header value ought to be (@annevk is not the only Mozillian happy with |
I understand your point. "Touch upon" and "specifies" do have different connotations, and "may be appropriate" does imply the possibility that it may not be appropriate in certain cases. It's important to consider the potential risks associated with opening links, especially in email, chat apps, and document attachments where deceptive links can be prevalent. While there are many trusted apps that can handle links without issues, it's undeniable that malicious cases exist. Users may unknowingly open deceptive links, particularly on mobile devices where popular websites often encourage app usage. Regarding the argument about the header value, I recognize that there are differing opinions on what it should be. However, the fact that developers are experiencing difficulties and inconsistencies highlights the need for the specification to provide a clear stance on this matter. Even if it's only a "SHOULD" recommendation, having a normative stance would help address the challenges faced by developers. Overall, finding the right balance between convenience and security is crucial when it comes to handling links, and it's essential for the specification to provide clear guidelines to mitigate potential risks. |
If an external app opens a URL in the browser should the value of
Sec-Fetch-Site:
becross-site
ornone
? We're having this argument in Firefox bug 1722044 because our current behavior sendscross-site
and someone complained that it differed from Chrome which sendsnone
. Is Chrome intentionally sending none (the user definitely chose this specific URL to load) or is that an accidental byproduct of being loaded from browser parent code without a webby history attached?§ 4.3 says
The browser has no way of knowing what the user was doing to trigger the external load, but in my own use the links I end up opening are usually someone else's content. This is especially true on mobile where there's no real difference between the same link opened from the Facebook app vs opened from a Facebook tab, or the Element app vs a link in https://chat.mozilla.org or some other Matrix instance. Or links in a PDF or Word document you downloaded from somewhere and then opened in their local executables, vs the same links in a PDF tab or an online Office365 word document.
Follow-up issue: we equally can't be 100% sure the user initiated the navigation in the 3rd party app, but most apps play nice so it seems totally reasonable to set
Sec-Fetch-User: ?1
for these. Apps that open random unintended URLs on their own are despised and quickly uninstalled.The text was updated successfully, but these errors were encountered: