From: sameer <sameer@c2.net>
To: tomw@netscape.com (Tom Weinstein)
Message Hash: ce6a5f36705e9d342e05c48fe5585d7795e1e6f0aeb67d1f656528a8e57ae836
Message ID: <199704141942.MAA15317@gabber.c2.net>
Reply To: <3351F2DF.7DC26A1A@netscape.com>
UTC Datetime: 1997-04-14 19:43:14 UTC
Raw Date: Mon, 14 Apr 1997 12:43:14 -0700 (PDT)
From: sameer <sameer@c2.net>
Date: Mon, 14 Apr 1997 12:43:14 -0700 (PDT)
To: tomw@netscape.com (Tom Weinstein)
Subject: Re: SSL weakness affecting links from pa
In-Reply-To: <3351F2DF.7DC26A1A@netscape.com>
Message-ID: <199704141942.MAA15317@gabber.c2.net>
MIME-Version: 1.0
Content-Type: text/plain
> information. This is a security hole in the web site, not in the
> browser. The browser follows the HTTP specification. If you have a
[. . .]
>
> In the eyes of some, the referer header is a privacy violation. It
> allows a site to see what site you visited before coming there. In the
> case of Navigator, we ONLY send the referer header when you click on a
> link. Not when you select a bookmark. Not when you type a URL into the
> location field. This allows web sites to see who links to them. I
> think that's something that a web author is entitled to know.
GET forms aren't the only thing wrong with referer, btw. An
associate of mine discovered some prioprietary Netscape information
from the Referer: headers on hits to his website from Netscape
employees, even.
I commend Netscape for providing users with the ability to
turn off referers.
--
Sameer Parekh Voice: 510-986-8770
President FAX: 510-986-8777
C2Net
http://www.c2.net/ sameer@c2.net
Return to April 1997
Return to “Toto <toto@sk.sympatico.ca>”