I propose we change the default for this to "same-origin" to make Django
applications leak less information to third party sites.
The main risk of breakage here would be linked websites breaking, if they
depend on verification through the Referer header. This is a pretty
fragile technique since it can be spoofed.
Documentation: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers
/Referrer-Policy
The MDN support grid is out of date: https://caniuse.com/#search=Referrer-
Policy
--
Ticket URL: <https://code.djangoproject.com/ticket/31232>
Django <https://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.
* cc: shubham singh (added)
--
Ticket URL: <https://code.djangoproject.com/ticket/31232#comment:1>
* stage: Unreviewed => Accepted
Comment:
Hi Adam, Yes, I think this fits our ''secure by default'' philosophy. As
long as the BC is documented in the release notes I think we should have
this.
--
Ticket URL: <https://code.djangoproject.com/ticket/31232#comment:2>
* owner: nobody => Adam (Chainz) Johnson
* status: new => assigned
* has_patch: 0 => 1
Comment:
[https://github.com/django/django/pull/12419 PR]
--
Ticket URL: <https://code.djangoproject.com/ticket/31232#comment:3>
* status: assigned => closed
* resolution: => fixed
Comment:
In [changeset:"72b97a5b1e22f5d464045be2e33f0436fa8061d3" 72b97a5]:
{{{
#!CommitTicketReference repository=""
revision="72b97a5b1e22f5d464045be2e33f0436fa8061d3"
Fixed #31232 -- Changed default SECURE_REFERRER_POLICY to 'same-origin'.
}}}
--
Ticket URL: <https://code.djangoproject.com/ticket/31232#comment:4>