[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13024 [Tor Browser]: Disable resource timing API?



#13024: Disable resource timing API?
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  tbb-team
  mikeperry              |     Status:  new
         Type:  defect   |  Milestone:
     Priority:  normal   |    Version:
    Component:  Tor      |   Keywords:  ff31-esr, tbb-fingerprinting,
  Browser                |  TorBrowserTeam201409
   Resolution:           |  Parent ID:
Actual Points:           |
       Points:           |
-------------------------+-------------------------------------------------

Comment (by gacar):

 This API is the ideal attack surface for cache-timing attacks similar to
 [http://sip.cs.princeton.edu/pub/webtiming.pdf 1] and
 [http://lcamtuf.coredump.cx/cachetime/ 2].

 Although, the timing information is restricted to same-origin scripts by
 default, websites can relax this by sending a [http://www.w3.org/TR
 /resource-timing/#cross-origin-resources `Timing-Allow-Origin`] response
 header.

 So, it seems wise to disable the relevant pref,
 `dom.enable_resource_timing`.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13024#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs