OCSP partitioning test site?
See original GitHub issueSo I was testing out ETP Strict before migrating from FPI to dFPI, and something in about:networking#dns
caught me off guard. For example, the isolation keys for github.com
inside a container were github.com^userContextId=1&firstPartyDomain=%28https%2Cgithub.com%29&partitionKey=%28https%2Cgithub.com%29
and ocsp.digicert.com^firstPartyDomain=%28https%2Cgithub.com%29
when both privacy.firstparty.isolate
and privacy.partition.network_state
were true
. When I disable FPI and switch to ETP Strict, only github.com^userContextId=1&partitionKey=%28https%2Cgithub.com%29
was shown but nothing for the OCSP cache (i.e. no ocsp.digicert.com^partitionKey=%28https%2Cgithub.com%29
).
On the other hand, the isolation keys for Google Safebrowsing and its OCSP were always
safebrowsing.googleapis.com^firstPartyDomain=safebrowsing.[blah-blah-blah].mozilla
and ocsp.pki.goog^firstPartyDomain=safebrowsing.[blah-blah-blah].mozilla
, regardless of whether FPI or dFPI is active.
So I am not sure if this is just a about:networking
thing and the OCSP cache is actually still being partitioned? Unlike cookies this does not seem to be easily verifiable on the client side.
Issue Analytics
- State:
- Created 2 years ago
- Comments:15 (8 by maintainers)
I think I actually solved this a while ago but I haven’t come round to writing it up…
Well turns out
news.ycombinator.com
is “bypassing” OCSP responder servers because of OCSP stapling. And of course the OCSP staus response is per-site, so my test above was absolute BS. But long story short, yes it is just aabout:networking#dns
thingy; OCSP partitioning works and even when I turn off Tracking Protection.Here’s my (new) test case anyway:
privacy.partition.network_state
is currently set totrue
andprivacy.partition.network_state.ocsp_cache
to 'false
.security.ssl.enable_ocsp_stapling
becausesecure.gravatar.com
uses OCSP stapling.ocsp.sectigo.com
at port 80 in your firewall/router.ocsp.sectigo.com
at your firewall/router.SEC_ERROR_OCSP_SERVER_ERROR
response because OCSP cache is not partitioned.privacy.partition.network_state.ocsp_cache
totrue
and restart Firefox.Rinse and repeat, you should now be able to see the gravatar in a new tab. So
privacy.partition.network_state.ocsp_cache
does work and I am just going to blame mozilla devs for not updatingabout:networking#dns
(sorry!).closing … this will never be done (testing from our/my side) … I appreciate testing upstream code, and bugz happen, but this is just beyond my time and scope