01:07
<sideshowbarker>

annevk: https://stackoverflow.com/questions/71311305/how-to-prevent-safari-from-dropping-the-authorization-header-when-following-a-re

Safari seems to drop the Authorization header when following a [same-origin] 301 redirect... Chrome (98) and Firefox (97) both follow the redirect and include the Authorization header in the subsequent GET request.

Wonder what behavior the spec requires here

01:09
<sideshowbarker>
and https://stackoverflow.com/questions/57974176/safari-does-not-persist-the-authorization-header-on-redirect is another 2-year-old question about the same thing
05:12
<Noam Rosenthal>
Yoav Weiss: Noam Rosenthal : what is the cross-origin redirects case for unload timing protecting against? It's basically saying if you go x.com -> y.com --redirects to-> x.com/bar, x.com/bar does not get unload timing for x.com. Why? No information about y.com leaked.
I checked, and the specific scenario (same->cross->same redirect, check that unload is not available) is tested in WPT and passes all 3 browsers... https://github.com/web-platform-tests/wpt/blob/master/navigation-timing/unload-event-same-origin-check.html#L57
https://wpt.fyi/results/navigation-timing/unload-event-same-origin-check.html?label=experimental&label=master&aligned
05:13
<Noam Rosenthal>
to me it seems like an unnecessary security measure or I don't understand it. Yoav Weiss ?
05:35
<Yoav Weiss>
It's possible that this is overly strict. It used to be TAO protected and have the same rules as TAO, but at some point we realized that it's not really protecting anything (it's not the origin which information was exposed that was opting in), so moved to a same origin check. The same=>cross=>same scenario was one that we protected against in TAO, so maybe that logic sticked around through the move to same origin checks.
05:37
<Yoav Weiss>
Maybe annevk has reasons as to why we should keep it, but I tend to agree with y'all that if the previous origin is the same as the destination origin, we could expose the data
07:48
<annevk>
I think Referer and Sec-Fetch-Site are impacted so I think this ought to be impacted as well. What might leak is if y.com does a further redirect based on a cookie. Now x.com could conspire with subsequent x.com, but given that Referer and Sec-Fetch-Site are impacted it might not entirely be clear whether it's the result of a redirect or a subsequent visit. Especially with more navigation tracking mitigation down the line.
07:48
<annevk>
Noam Rosenthal: Yoav Weiss: Domenic: ^^
07:50
<Noam Rosenthal>
I think Referer and Sec-Fetch-Site are impacted so I think this ought to be impacted as well. What might leak is if y.com does a further redirect based on a cookie. Now x.com could conspire with subsequent x.com, but given that Referer and Sec-Fetch-Site are impacted it might not entirely be clear whether it's the result of a redirect or a subsequent visit. Especially with more navigation tracking mitigation down the line.
OK so this hides the fact that the unload and the new document are the same visit, which is otherwise a hidden fact. This also brings back the https://github.com/w3c/navigation-timing/issues/160 thing...
07:56
<annevk>
Noam Rosenthal: yeah, though I'd argue that case is worse.
07:57
<annevk>
sideshowbarker: left a reply. Not sure if Safari has an open bug for this, maybe you want to file one?
07:58
<sideshowbarker>
sideshowbarker: left a reply. Not sure if Safari has an open bug for this, maybe you want to file one?
I'll ask the OP if they can file a bug
15:28
<devsnek>
any webkit/gecko people feeling inspired? https://github.com/whatwg/websockets/issues/20
15:29
<devsnek>
annevk: you seemed to not hate this, in the past at least. do you think mozilla would accept contribution for this?
15:31
<annevk>
devsnek: yeah probably, but will need spec + tests