[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4783 [Tor Browser]: Set Referrer to loaded website



#4783: Set Referrer to loaded website
-------------------------------+--------------------------------------------
    Reporter:  ancientmariner  |       Owner:  mikeperry
        Type:  defect          |      Status:  closed   
    Priority:  normal          |   Milestone:           
   Component:  Tor Browser     |     Version:           
  Resolution:  wontfix         |    Keywords:           
      Parent:                  |      Points:           
Actualpoints:                  |  
-------------------------------+--------------------------------------------
Changes (by mikeperry):

  * status:  new => closed
  * resolution:  => wontfix


Comment:

 Proper referer spoofing is harder than it seems. The policy you suggest
 does break actual sites (iirc the washington post was among them).

 We tried a more nuanced policy (see #2148 for its evolution), but at the
 end of the day, we were devoting so much effort to maintaining this policy
 we decided to abandon it, because referer spoofing does not stop bad
 actors in the first place. Consider for example that Google+ encodes the
 referer in the GET parameters of +1 buttons. Ad networks also do this,
 too.

 See also the middle chunk of https://lists.torproject.org/pipermail/tor-
 dev/2011-June/002806.html and
 http://archives.seul.org/or/dev/Jul-2011/msg00019.html for more
 discussion.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4783#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs