The Referrer-Policy header allows web developers to set a referrer policy for a document without editing the HTML (as they would need to if they were to set the policy via <meta> tag). The Referrer-Policy header can also be applied on redirect responses, to modify the referrer policy and Referer header while following redirects.
The Referrer-Policy HTTP header will eventually replace Content Security Policy's 'referrer' directive, as described in this thread.
Firefox: No public signals
Edge: No public signals
Safari: No public signals
Firefox developers have participated extensively in the Referrer Policy spec and I believe they are planning to implement the Referrer-Policy header, though I can't find a place where they said so publicly.
Adding the Referrer-Policy header will not break existing content (except indirectly, in that we intend to eventually remove the CSP 'referrer' directive once the Referrer-Policy header is shipped, pending measurement of the 'referrer' directive's prevalence in existing content). Once sites are using the Referrer-Policy header, removing the feature will present a privacy loss for sites that are relying on it to prevent secret URLs from leaking in referrer values.
The Referrer-Policy header allows web developers to set a referrer policy for a document without editing the HTML (as they would need to if they were to set the policy via <meta> tag). The Referrer-Policy header can also be applied on redirect responses, to modify the referrer policy and Referer header while following redirects.
The Referrer-Policy HTTP header will eventually replace Content Security Policy's 'referrer' directive, as described in this thread.
Firefox: No public signals
Edge: No public signals
Safari: No public signals
Firefox developers have participated extensively in the Referrer Policy spec and I believe they are planning to implement the Referrer-Policy header, though I can't find a place where they said so publicly.
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Emily Stark, blink-dev, Matthew Menke, Jochen Eisinger
Non-owner's LGTM for this; I'm especially excited about being able to drop the deprecated CSP directive that we, but no one else, implemented.
-mike
Rick Byers
unread,
Jun 13, 2016, 10:39:00 AM6/13/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Mike West, Emily Stark, blink-dev, Matthew Menke, Jochen Eisinger
Given that there would be privacy implications to removing this (which could make us more cautious than normal when the usage is small) it would be nice to have some signal from Edge and/or Safari. Has anyone asked them?
But it does look like Firefox is likely to ship this soon (I updated the chromestatus entry). So that's enough for me: LGTM1
Rick Byers
unread,
Jun 13, 2016, 10:40:24 AM6/13/16
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Mike West, Emily Stark, blink-dev, Matthew Menke, Jochen Eisinger
Oh whoops, I was thinking this was an "implement and ship" - sorry. Let's revisit once there's an implementation behind a flag (and hopefully more discussion with other vendors).