Summary:
Referrer-policy controls the referrer information sent in the request
header. It can be specified in the response header or in the document. If
no policy is specified, we use the default policy.

Currently, the default is ‘no-referrer-when-downgrade’, which sends the
origin, path, and query string of the URL of the originating document as
the referrer but doesn’t send the referrer when navigating to a less secure
destination (e.g., https: to http:).

We plan to reduce the granularity exposed in the referrer by changing the
default to `strict-origin-when-cross-origin`. In addition to the existing
restrictions, this new default only sends the origin while performing a
cross-origin request (except https: to http:, which doesn’t send the
referrer).

The policy will apply to navigation, redirect, and sub-resource requests.

An illustrative example:
Navigating from https://mozilla.org/path?query to https://example.com when
no referrer-policy is specified:

   - Current default:     https://mozilla.org/path?query
   - New default:          https://mozilla.org/

More details:
Bug: https://bugzilla.mozilla.org/show_bug.cgi?id=1589074

Link to standard:
https://github.com/w3c/webappsec-referrer-policy/pull/142

Platform coverage:
All platforms.

Preference:
network.http.referer.defaultPolicy

Estimated or target release:
86

Is this feature enabled by default in sandboxed iframes?
Yes.

DevTools bug:
No

Do other browser engines implement this?
Chrome has been shipping the behavior since 85.
https://www.chromestatus.com/feature/6251880185331712

Safari has been shipping the behavior with a slight variant.
https://trac.webkit.org/changeset/250413/webkit

Is this feature restricted to secure contexts?
No.

Web-platform-tests:
https://github.com/mozilla/gecko-dev/commit/7c1ab5d4c7dbd1e03e3c1a58aa65de689257adda

Best regards
Dimi
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to