[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #14085 [Applications/Tor Browser]: HTTP redirects can leak third-party state (cookies, etc) (was: Redefine HTTP redirect responses to match 3rd party context)



#14085: HTTP redirects can leak third-party state (cookies, etc)
--------------------------------------+-----------------------------------
 Reporter:  michael                   |          Owner:  tbb-team
     Type:  enhancement               |         Status:  needs_information
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:  #3246                     |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+-----------------------------------
Changes (by arthuredelstein):

 * severity:   => Normal


Old description:

> Pending consensus by the TBB team, reimplement all ''HTTP redirect''
> (301, 302, 303, 307, 308) responses in ''3rd party DOM contexts.''
> Rationale of this is to '''support popup and new window''' crossdomain
> cookie conditions as
> [https://bugzilla.mozilla.org/show_bug.cgi?id=565965#c3 as suggested by
> Dan Witte].

New description:

 HTTP double redirects (301, 302, etc.) can result in third-party cookies
 being read without the consent of the user.

 See discussion [https://bugzilla.mozilla.org/show_bug.cgi?id=565965#c3 by
 Dan Witte].

--

Comment:

 Here's a summary of how double-redirects can violate the ban on third-
 party cookies:
 1. Visit A.com in Tab 1:
   * A.com sets a cookie ("data=A1") with A.com first party
 2. Visit B.com in Tab 2:
   * B.com/ redirects to A.com/trac?from=B.com
   * A.com receives the previously-set cookie "data=A1" in GET request
   * A.com/trac?from=B.com redirects to B.com/home?data=A1

 Such a double redirect is invisible to the user, because A.com is never
 visible in Tab 2's URL bar. But now A.com has linked the activities in Tab
 1 and Tab 2.

 I observed an example of this behavior while using Tor Browser.
 (google.com was A.com, and persona.org was B.com)

 So I think the idea of considering redirects to have third-party rights is
 a good idea. HTTP request headers that would seem to leak state include
 * `Cookie`
 * `Authorization`
 Also OCSP requests might be revealing. What else do we need to worry
 about?

 (I edited the title and description to try to clarify what this ticket is
 about.)

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14085#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs