[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #30981 [Applications]: Torbrowser/Torbirdy insecure settings
#30981: Torbrowser/Torbirdy insecure settings
-----------------------------------+------------------------------
Reporter: cypherpunks | Owner: (none)
Type: enhancement | Status: new
Priority: High | Component: Applications
Version: | Severity: Critical
Keywords: certificates, history | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------+------------------------------
Described for Torbirdy, applicable in the same way to Torbrowser.
security.OCSP.enabled must be 0, after program restart 1
Leak of used https-certificates, also leak of certificates used to check
signatures of e-mails, thus history of used certificates (i.e. website,
signatures, keys, if tied to a certificate).
furthermore leak of fingerprint (in case of Torbirdy, should be secured
with Torbrowser)
Accept:
Accept-Language:
Accept-Encoding:
...
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/30981>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs