Comment by jokoon

Comment by jokoon 4 days ago

18 replies

I set firefox to clear cookies, also using cookies to "strict"

This somehow causes a huge pain to connect to mozilla's matrix instance, and I never understood why. This is a bit ironic since firefox has that feature to clear cookies.

I had to reset password, and do other weird things, I can't remember what exactly.

I hope this MAS thing fixes it.

jeroenhd 3 days ago

Putting tracking protection to strict essentially makes Firefox violate certain web standards. Developers aren't going to test against that, and if they are they're probably not going to be able to do much about the problems strict tracking protection causes.

If MAS fixes this, it'll be by accident and it'll probably break in the future. Firefox warns against this kind of breakage if you enable strict tracking protection in the settings. You can't have strict tracking protection + websites doing cross-domain authentication working.

anon7000 4 days ago

I mean, yeah, tracking prevention features basically completely break cross-domain authentication. There are a surprising number of valid use cases that need cross-domain auth (or make the user experience a lot easier). While there are workarounds these days, sometimes it does require deep changes in how auth works

  • jokoon 4 days ago

    > There are a surprising number of valid use cases that need cross-domain auth

    I am not a web developer, but I would disagree with that.

    Either web standards respect privacy or they don't, but I would not sacrifice privacy for anything.

    Firefox was right to prevent tracking, it highlights how webstandards are just not good. I something doesn't work properly in a firefox private window, to me it should not exist.

    • dwattttt 4 days ago

      Authentication requires the opposite of privacy. If you don't want to be identified, you can't restrict anything to your identity.

      • kevin_thibedeau 4 days ago

        If I'm authenticating with server A. I shouldn't have to carry ephemera from server B. A can interact with B on its own if necessary.

        Bubbling up these architectural details to the front end is a symptom of the webdev cargo cult coming up with broken ideas that get fossilized as the status quo.

        • johnmaguire 4 days ago

          With OIDC, both occur: the client is redirected to the authentication server where they directly authenticate, then carries a token cross-domain back to the service. Finally, the service validates the token against the auth server.

          The alternative would be something where I enter my Google username/password on random websites, and trust that they will forward it to Google and not do anything nefarious. This is less secure and less private.

    • kibwen 4 days ago

      The status quo appears to involve handing over your account password to your chosen client. That's worse than this.

      • wkat4242 4 days ago

        If you don't trust your matrix client, why use it at all?

        It's also a bit disheartening to see Matrix putting all that "Log in with Google", Apple, Facebook etc so prominently on their login page. The whole idea of decentralised services was getting out of those walled gardens.

        • johnmaguire 4 days ago

          Yeah, I would argue it's less about removing trust from the client (which will ultimately get an auth token in addition to secrets and plaintext messages) and more about allowing for centralized authentication and authorization policies.

      • cvwright 4 days ago

        But you already trust your client with all the private keys and message plaintexts for your account.

        I struggle to see why I should trust it with those things but not the account password.