[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #26146 [Applications/Tor Browser]: Setting `general.useragent.override` does not spoof the platform part anymore in ESR 60 which is confusing
#26146: Setting `general.useragent.override` does not spoof the platform part
anymore in ESR 60 which is confusing
-------------------------------------------------+-------------------------
Reporter: gk | Owner: tbb-
| team
Type: defect | Status:
| needs_information
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ff60-esr, tbb-fingerprinting-os, | Actual Points:
tbb-8.0-issues |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Changes (by mcs):
* status: new => needs_information
Comment:
Replying to [comment:39 tom]:
> I'm not sure what OSCPU is supposed to be without fingerprinting; but in
RFP mode, it's the same as User Agent. So if RFP is enabled; you could go
grab the value from Navigator::GetOscpu and return that instead of
querying the HTTP header...
Maybe I am misunderstanding something, but we need the entire, unspoofed
user agent string. As far as I can tell, the only code that knows how to
construct such a string is here:
https://searchfox.org/mozilla-
central/source/netwerk/protocol/http/nsHttpHandler.cpp#909
Unfortunately, when `privacy.resistFingerprinting` is true, there is no
way for code outside of `nsHttpHandler.cpp` to access the string. One
possible solution would be to add a new attribute to
`nsIHttpProtocolHandler` such as `unspoofedUserAgent`.
A question for tom: Is Mozilla likely to switch to this approach and
accept such a patch?
A question for gk: Do we want to try this change in Tor Browser?
Secondarily, should Kathy and I work on a patch this week or someone else
or should we wait?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26146#comment:42>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs