[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13766 [Tor Browser]: Raise MaxCircuitDirtiness for Tor Browser (to Infinite)?



#13766: Raise MaxCircuitDirtiness for Tor Browser (to Infinite)?
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  tbb-team
  mikeperry              |     Status:  new
         Type:  defect   |  Milestone:
     Priority:  normal   |    Version:
    Component:  Tor      |   Keywords:  tbb-usability, TorBrowserTeam201501
  Browser                |  Parent ID:
   Resolution:           |
Actual Points:           |
       Points:           |
-------------------------+-------------------------------------------------

Comment (by mikeperry):

 Replying to [comment:6 mikeperry]:
 > The updater is another thing that may be affected by this. We probably
 want to ensure we are sending a unique, new nonce as the SOCKS password
 field for updater requests (both to
 https://www.torproject.org/projects/torbrowser/RecommendedTBBVersions and
 to the update manifests at
 https://dist.torproject.org/torbrowser/update_2/).

 At the same time, we want to avoid guard discovery attacks here (see
 https://trac.torproject.org/projects/tor/ticket/7870#comment:18). This
 means we want to not give content elements on random websites the ability
 to generate a ton of script tags with the src set to
 https://www.torproject.org/projects/torbrowser/RecommendedTBBVersions, for
 example.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13766#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs