Apologies, this was the outcome of a poor FastMail mobile UI interaction.

On Fri, Mar 8, 2019, at 9:48 AM, z...@falconsigh.net wrote:
> 
> 
> On Fri, Mar 8, 2019, at 1:31 AM, Ehsan Akhgari wrote:
> > *Summary*: As part of the anti-tracking project, we'd like to experiment
> > with a new feature in order to mitigate the impact of third-party tracking
> > scripts running in top-level documents.  As we are planning to start
> > removing the storage capabilities of third-party trackers, which removes
> > their ability to store unique identifiers for each client in cookies which
> > would be transmitted to servers across websites, a number of cross-site
> > trackers have started to switch to using first-party cookies to store their
> > unique identifiers.  The way that this works typically is through
> > annotating outbound links to the target website with a unique query string
> > parameter, and then reading and storing that unique parameter in the
> > first-party cookie storage through the third-party scripts that they
> > control which are running in the context of the top-level target site when
> > the user follows such a link.
> > 
> > This is bad because it would allow cross-site trackers to keep tracking the
> > user through a unique identifier, but it would also expose the unique
> > identifier used by tracker1 to all of the other trackers that have active
> > code running on the page, which would allow them to sync up each others'
> > tracking identifiers without resorting to practices such as cookie syncing <
> > https://clearcode.cc/blog/cookie-syncing/>.
> > 
> > We'd like to experiment with imposing a short maximum life-time on cookies
> > set through document.cookie in order to ensure that these unique
> > identifiers would expire relatively quickly once they are established, and
> > wouldn't allow cross-site trackers to establish a pervasive permanent
> > unique identifier.  We're picking seven days to be compatible with Safari
> > which has been shipping this for a while now <
> > https://webkit.org/blog/8613/intelligent-tracking-prevention-2-1/>.
> > 
> > *Bug*: This was implemented originally in (disabled by default)
> > https://bugzilla.mozilla.org/show_bug.cgi?id=1529836.  The bug to enable
> > this on Nightly is https://bugzilla.mozilla.org/show_bug.cgi?id=1533584.
> > *Link to standard*: No public standard change has been made for this
> > feature yet.  We should modify the cookie RFC when we know more about
> > whether we would like to ship this change or not given that we would be the
> > second web engine doing so.
> > *Platform coverage*: where will this be available? Everywhere.
> > *Estimated or target release*: in which version do you want to/plan to
> > release this? Getting enabled in Nightly in 67, staying Nightly only for
> > now in order to collect some early feedback.  No estimated target release
> > available yet since this is an early exploration.
> > *Preference behind which this will be implemented*: if applicable, how can
> > interested parties test this before it ships pref'd on by default? The
> > preference for this feature, available in Nightly right now, is
> > privacy.documentCookies.maxage.  The value of this pref is the maximum
> > life-time cap in seconds.  A value of 0 would disable enforcing a cap (0 is
> > the current default.)
> > *Is this feature enabled by default in sandboxed iframes?* If not, is there
> > a proposed sandbox flag to enable it? If allowed, does it preserve the
> > current invariants in terms of what sandboxed iframes can do? I'm proposing
> > to enable this feature in sandboxed iframes by default.  It will preserve
> > the current invariants.
> > *DevTools bug*: No specific bug, since devtools already supports showing
> > the expiry date of cookies and once this feature gets enabled it will
> > correctly display the expiry date for those cookies where Firefox would
> > enforce this cap on.
> > *Do other browser engines implement this?* Answer with: Safari shipped
> > (since version 12.0.x, tested in 12.0.3, announced as part of ITP 2.1
> > recently: <https://webkit.org/blog/8613/intelligent-tracking-prevention-2-1/
> > >).
> > 
> > *web-platform-tests*: This is an intervention which different engines do
> > not agree on yet.  Creating a web-platform-test for it would be very simple
> > but it will be failing in the engines that do not agree with the
> > intervention.  I'm not sure what the recommendation for testing these types
> > of changes is, would be happy to submit a test if there is a path for
> > getting them accepted into wpt.
> > 
> > *Is this feature restricted to secure contexts?* It is not.  This is an
> > intervention which is trying to protect the user's privacy, and we would
> > like to ensure the protections would be applicable to non-secure contexts
> > as well.  Arguably these protections are even more important for non-secure
> > contexts given the fact that cookies set through document.cookie would be
> > visible to network MITM attackers after that point.
> > 
> > Here are the answers to a few other questions which you may have on your
> > mind regarding this proposed change.
> > 
> > *Would this change cause people to get logged out of services?* We believe
> > the answer to that should be no, at least for services with secure logins.
> > Authentication cookies should be marked as Secure and HttpOnly, and if
> > they're set through document.cookie they can't be HttpOnly by default and
> > are therefore vulnerable to XSS attacks.  Therefore we hope that most
> > services people log in to would already set their authentication cookies
> > through a secure HTTP response and would therefore be unaffected.
> > 
> > *Would this change cause people to see more EU cookie dialogs?*
> > Potentially, yes.  We've looked at a few such sites which show such banners
> > to see how they remember that the user has dismissed the dialog.  Many of
> > them seem to set a cookie on an HTTP response so should be unaffected by
> > this change.  Some, however, do set a cookie using document.cookie and
> > would therefore be probably affected, but it's unclear how widespread this
> > problem would be.  One of the reasons for enabling this feature on Nightly
> > is to get some early feedback on qualitative issues like this.
> > 
> > Please let me know if you have any questions or concerns.
> > 
> > Thanks,
> > -- 
> > Ehsan
> > _______________________________________________
> > dev-platform mailing list
> > dev-platform@lists.mozilla.org
> > https://lists.mozilla.org/listinfo/dev-platform
> >
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to