[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #28873 [Applications/Tor Browser]: Cascading of permissions does not seem to work properly in Tor Browser 8
#28873: Cascading of permissions does not seem to work properly in Tor Browser 8
-------------------------------------------------+-------------------------
Reporter: gk | Owner: ma1
Type: defect | Status: closed
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution: fixed
Keywords: noscript, tbb-security, tbb- | Actual Points:
torbutton, tbb-8.0-issues, tbb-regression, |
TorBrowserTeam201812R |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Changes (by gk):
* status: needs_information => closed
* resolution: => fixed
Comment:
Replying to [comment:10 ma1]:
> An afterthough: some users are complaining that having TRUSTED subframes
constrained by DEFAULT/UNTRUSTED parent document is annoying, if not
disfunctional: for instance if you've set Youtube to TRUSTED, embedded
movies used to work without the need of raising privileges of the parent
page. One may object that you could always use "show only this frame", but
do we really have a strong case here for cascading inline restrictions to
trusted subdocuments? What's the threat model we're guarding against
(beside clickjacking, which is orthogonal to scripting though)?
The idea is to defend against malicious exit nodes or other attackers on
the wire who want to inject and execute malicious JavaScript despite the
user setting the security slider to "safer", which means (among other
things) "only execute JavaScript loaded over HTTPS provided the URL bar
domain got loaded over HTTPS as well".
E.g. it should not be possible that an exit node owner rewrites URLs in a
document loaded over HTTP, pointing to malicious JavaScript loaded over
HTTPS from a domain they control and getting that JavaScript executed in
Tor Browser if the user is on "safer".
I am fine adding additional code on our side for interacting with NoScript
to get that property if that helps you and other users of NoScript who
where complaining.
That said, this bug got fixed with the update to NoScript 10.2.1 on
`master` (commit b32e182633bba7733b635bc5dd0fcbd55436f4d7) and `maint-8.0`
(commit b35cea6792f294d0a625fde5595f1c96a8a2a72a).
(FWIW: the .xpi on AMO does not have an "an" anymore indicating it works
on Android, is that intentional? Diffing 10.2.0 and 10.2.1 I think 10.2.1
should still do its job on Android, too, or am I overlooking something?)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28873#comment:11>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs