Closed
Bug 1170190
Opened 9 years ago
Closed 8 years ago
Add a passive (detection only) mode for Tracking Protection
Categories
(Toolkit :: Safe Browsing, defect, P5)
Toolkit
Safe Browsing
Tracking
()
RESOLVED
FIXED
mozilla53
Tracking | Status | |
---|---|---|
firefox53 | --- | fixed |
People
(Reporter: snorp, Assigned: ehsan.akhgari)
References
Details
Attachments
(3 files, 2 obsolete files)
(deleted),
patch
|
mayhemer
:
review+
|
Details | Diff | Splinter Review |
(deleted),
patch
|
mcmanus
:
review+
|
Details | Diff | Splinter Review |
(deleted),
patch
|
mcmanus
:
review+
|
Details | Diff | Splinter Review |
It would be nice if we could have a mode for TP that would run the classifier as usual, but not block anything. It would just put the status on the channel (or somewhere), and we could use that information to inform the user that tracking is (potentially?) occurring.
Updated•9 years ago
|
tracking-fennec: --- → ?
Comment 2•9 years ago
|
||
This requires a higher level discussion about what we want to do with tracking protection beyond Fx42.
tracking-fennec: ? → ---
Comment 3•9 years ago
|
||
Adding Barbara for tracking and figuring out our plan for beyond Fx42
Flags: needinfo?(krudnitski) → needinfo?(bbermes)
Comment 4•9 years ago
|
||
snorp, what's the different between this and 1170194 (tracking detection)
Flags: needinfo?(bbermes) → needinfo?(snorp)
Reporter | ||
Comment 5•9 years ago
|
||
Bug 1170194 would use this to implement the feature.
Flags: needinfo?(snorp)
Comment 6•9 years ago
|
||
Francois, is this issue already on your team's radar somewhere else? Basically we want to be able to know if there are tracking elements loaded on a page, so we can show that data to the user as a reason to potentially want to enable tracking protection.
Flags: needinfo?(francois)
Comment 7•9 years ago
|
||
Steve told me that it did come up in Boston and that someone had found a way to do this today so it sounded like we wouldn't have to do anything on the platform side. I've forgotten the exact details though.
Flags: needinfo?(francois) → needinfo?(sworkman)
Comment 8•9 years ago
|
||
Right now if TP in PBM is disabled for a site, then Control Center shows two different messages if trackers are detected or not. The assumption was that if we can do that, then we can add new UI for Tracking Detection. I am not sure of the API they use here.
Flags: needinfo?(sworkman)
Updated•9 years ago
|
Component: DOM: Security → Safe Browsing
Product: Core → Toolkit
Updated•8 years ago
|
Summary: Add a passive mode for Tracking Protection → Add a passive (detection only) mode for Tracking Protection
Assignee | ||
Comment 9•8 years ago
|
||
Bug 1141814 actually ended up doing most of the work here.
I'm planning to make the privacy.trackingprotection.annotate_channels pref only control whether channels are annotated as tracking or non-tracking, and add an API to nsIChannel to query that information. I'm going to create another pref (privacy.trackingprotection.lower_network_priority) to control the behavior in bug 1141814.
Assignee: nobody → ehsan
Blocks: 1321874
Assignee | ||
Comment 10•8 years ago
|
||
Attachment #8819432 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 11•8 years ago
|
||
Attachment #8819433 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 12•8 years ago
|
||
Attachment #8819434 -
Flags: review?(honzab.moz)
Updated•8 years ago
|
Attachment #8819432 -
Flags: review?(honzab.moz) → review+
Comment 13•8 years ago
|
||
Comment on attachment 8819433 [details] [diff] [review]
Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation
Review of attachment 8819433 [details] [diff] [review]:
-----------------------------------------------------------------
::: netwerk/base/nsChannelClassifier.cpp
@@ +714,5 @@
> + }
> + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel);
> + if (httpChannel) {
> + static_cast<HttpBaseChannel*>(httpChannel.get())->
> + SetIsTrackingResource();
can HttpBaseChannel have iid to use queryobject? I think it can. no static_cast on http channels please - a bad thing to do!
Attachment #8819433 -
Flags: review?(honzab.moz) → review-
Comment 14•8 years ago
|
||
Comment on attachment 8819434 [details] [diff] [review]
Part 3: Add tests for the e10s case too
Review of attachment 8819434 [details] [diff] [review]:
-----------------------------------------------------------------
hard to check the tests when there is no single word of explanation. can you provide some please?
::: netwerk/protocol/http/nsHttpChannel.cpp
@@ +6147,5 @@
> + nsCOMPtr<nsIParentChannel> parentChannel;
> + NS_QueryNotificationCallbacks(this, parentChannel);
> + RefPtr<HttpChannelParent> httpParent = do_QueryObject(parentChannel);
> + if (httpParent) {
> + Unused << httpParent->SendSetPriority(newValue);
check ipcclosed
::: netwerk/test/unit/test_trackingProtection_annotateChannels.js
@@ +33,5 @@
> var httpServer;
> var normalOrigin, trackingOrigin;
> var testPriorityMap;
> var currentTest;
> +var skipNormalPriority, skipLowestPriority;
add a comment what these are intended for
Assignee | ||
Comment 15•8 years ago
|
||
(In reply to Honza Bambas (:mayhemer) from comment #13)
> Comment on attachment 8819433 [details] [diff] [review]
> Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the
> channel's tracking annotation
>
> Review of attachment 8819433 [details] [diff] [review]:
> -----------------------------------------------------------------
>
> ::: netwerk/base/nsChannelClassifier.cpp
> @@ +714,5 @@
> > + }
> > + nsCOMPtr<nsIHttpChannel> httpChannel = do_QueryInterface(mChannel);
> > + if (httpChannel) {
> > + static_cast<HttpBaseChannel*>(httpChannel.get())->
> > + SetIsTrackingResource();
>
> can HttpBaseChannel have iid to use queryobject? I think it can.
Yeah, I don't see why not! New patches coming up.
Assignee | ||
Comment 16•8 years ago
|
||
(In reply to Honza Bambas (:mayhemer) from comment #14)
> Comment on attachment 8819434 [details] [diff] [review]
> Part 3: Add tests for the e10s case too
>
> Review of attachment 8819434 [details] [diff] [review]:
> -----------------------------------------------------------------
>
> hard to check the tests when there is no single word of explanation. can
> you provide some please?
Sure, I'll add some comments.
Assignee | ||
Comment 17•8 years ago
|
||
Attachment #8819923 -
Flags: review?(honzab.moz)
Assignee | ||
Updated•8 years ago
|
Attachment #8819433 -
Attachment is obsolete: true
Assignee | ||
Comment 18•8 years ago
|
||
Attachment #8819924 -
Flags: review?(honzab.moz)
Assignee | ||
Updated•8 years ago
|
Attachment #8819434 -
Attachment is obsolete: true
Attachment #8819434 -
Flags: review?(honzab.moz)
Assignee | ||
Comment 19•8 years ago
|
||
Comment on attachment 8819924 [details] [diff] [review]
Part 3: Add tests for the e10s case too
Honza is away until the next year. Patrick, do you mind taking a second look at these patches please?
Attachment #8819924 -
Flags: review?(honzab.moz) → review?(mcmanus)
Assignee | ||
Updated•8 years ago
|
Attachment #8819923 -
Flags: review?(honzab.moz) → review?(mcmanus)
Comment 20•8 years ago
|
||
Comment on attachment 8819923 [details] [diff] [review]
Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation
Review of attachment 8819923 [details] [diff] [review]:
-----------------------------------------------------------------
awesome.
how does tp* feel about this? iirc there was some notable overhead to TP being skirted by being default off. but maybe that's OBE.
Attachment #8819923 -
Flags: review?(mcmanus) → review+
Comment 21•8 years ago
|
||
Comment on attachment 8819924 [details] [diff] [review]
Part 3: Add tests for the e10s case too
Review of attachment 8819924 [details] [diff] [review]:
-----------------------------------------------------------------
I guess we can comment that this makes setpriority available in content as well.
Attachment #8819924 -
Flags: review?(mcmanus) → review+
Assignee | ||
Comment 22•8 years ago
|
||
(In reply to Patrick McManus [:mcmanus] from comment #20)
> how does tp* feel about this? iirc there was some notable overhead to TP
> being skirted by being default off. but maybe that's OBE.
I'm doing this for bug 1322105 where I win ~3% back on Tpo. :-)
(In reply to Patrick McManus [:mcmanus] from comment #21)
> I guess we can comment that this makes setpriority available in content as
> well.
Will do. Thanks for the reviews!
Assignee | ||
Comment 23•8 years ago
|
||
BTW I think you may be thinking of bug 1122691. The thing that causes the regression is disabling speculative connect and DNS prefetching for channels because we don't want to do those things if after classification it becomes clear we want to block the connection. I made sure in bug 1324053 that we don't disable those things for passive TP, so that concern is no longer applicable.
Comment 24•8 years ago
|
||
Pushed by eakhgari@mozilla.com:
https://hg.mozilla.org/integration/mozilla-inbound/rev/d2c65588f41f
Part 1: Split out a new pref from privacy.trackingprotection.annotate_channels to explicitly control whether the channel priority is adjusted; r=mayhemer
https://hg.mozilla.org/integration/mozilla-inbound/rev/891791aa2301
Part 2: Add the nsIHttpChannel::IsTrackingResource() API to query the channel's tracking annotation; r=mayhemer
https://hg.mozilla.org/integration/mozilla-inbound/rev/1ac1af4f133b
Part 3: Add tests for the e10s case too; r=mayhemer
Assignee | ||
Comment 25•8 years ago
|
||
Shoot, I accidentally pushed these without amending the commit messages. Sorry about that. :/
Comment 26•8 years ago
|
||
bugherder |
https://hg.mozilla.org/mozilla-central/rev/d2c65588f41f
https://hg.mozilla.org/mozilla-central/rev/891791aa2301
https://hg.mozilla.org/mozilla-central/rev/1ac1af4f133b
Status: NEW → RESOLVED
Closed: 8 years ago
status-firefox53:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → mozilla53
Updated•8 years ago
|
You need to log in
before you can comment on or make changes to this bug.
Description
•