[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?
#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: task | Status: needs_review
Priority: major | Milestone:
Component: Firefox Patch | Version:
Issues | Keywords: tbb-fingerprinting,
Resolution: | tbb-pref, MikePerry201401R
Actual Points: | Parent ID:
Points: |
-------------------------------------+-------------------------------------
Comment (by cypherpunks):
Replying to [comment:26 oc]:
> on my machine, a 127.0.0.1 ABE rule ''does'' catch 2130706433?
'''It looks as if Noscript normalizes IP addresses only for "Site x.x.x.x"
directives, but not for ''predicates'' e.g. "Deny from x.x.x.x".'''
If I test the second rule from comment 16 with a local webserver serving a
page including a remote image, the image loads when accessing the server
through 127.0.0.1, but not when accessing it through 2130706433.
However a flat out
{{{
Site 127.0.0.1
Deny
}}}
means I cannot access the server itself through either address, which is
what you may have tested.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs