[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #21418 [- Select a component]: New Tor Browser http response header, for high security websites



#21418: New Tor Browser http response header, for high security websites
--------------------------------------+-----------------
     Reporter:  micahlee              |      Owner:
         Type:  defect                |     Status:  new
     Priority:  Medium                |  Milestone:
    Component:  - Select a component  |    Version:
     Severity:  Normal                |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |   Reviewer:
      Sponsor:                        |
--------------------------------------+-----------------
 When someone uses Tor Browser to load a SecureDrop website, if javascript
 is enabled, it recommends that they disable it. But at the moment, there
 are some big UX problems with how it's done: It's a big scary red warning
 that's displayed to nearly all users, and the instructions are out-of-date
 (they tell you to disable JS using NoScript instead of the Tor Browser
 security settings slider). Overall, it's scary and confusing, and tells
 _everyone_ to jump through hoops.

 Here's some of the discussion about this on the SecureDrop issue tracker:
 https://github.com/freedomofpress/securedrop/issues/1566

 The rationale behind telling users to disable javascript is because the
 SecureDrop server itself is part of the threat model. If someone
 successfully hacks a SecureDrop server, they can then serve Tor Browser
 exploits to all of its users to deanonymize them (similar to the Freedom
 Hosting attack), and high security mode reduces this attack service a lot.

 I'd like to propose a new custom http response header that Tor Browser
 watches for: `X-Tor-High-Security: 1`. If you load a website with this
 header set, no matter what the Tor Browser security slider is currently
 set to, it should treat that tab as if the slider were set to high.

 This would also be very useful for anyone running websites where they
 include themselves in the threat model, such as Tor-based email providers.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21418>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs