[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13496 [Applications/Tor Browser]: Write test for spoofed navigator* values in workers



#13496: Write test for spoofed navigator* values in workers
--------------------------------------+---------------------
 Reporter:  gk                        |          Owner:  gk
     Type:  task                      |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:  ff38-esr, tbb-testcase    |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+---------------------

Comment (by Thorin):

 Replying to [comment:1 gk]:
 > A preliminary test is in bug_13496 in my public test repo. Reminder:
 don't forget to test nested workers.

 I think we can close this. Override prefs are not used anymore see tom's
 comment - https://trac.torproject.org/projects/tor/ticket/27268#comment:18
 "Yeah all of these should be deleted from tor's js file. With RFP enabled
 they do nothing"

 ---

 PS: FYI: I know this is not what the ticket was for, but you can go to
 https://securehomes.esat.kuleuven.be/~gacar/dev/worker_test.html which
 shows web workers return RFP values (although some spoofed values are the
 real values, e.g Win32 on windows machines) - I might add this to TZP but
 it's probably a waste of time

 PPS: do you want me to test RFP UA spoofing in nested WebWorkers? Or would
 that also be a waste of time - anyway, feel free to close this

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13496#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs