[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #18097 [Tor Browser]: Font fingerprinting defenses roadmap (parent ticket)
#18097: Font fingerprinting defenses roadmap (parent ticket)
-------------------------------------+--------------------------
Reporter: arthuredelstein | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-font-fingerprinting | Actual Points:
Parent ID: | Points:
Sponsor: |
-------------------------------------+--------------------------
Description changed by arthuredelstein:
Old description:
> Defending against font fingerprinting is complex. We have to worry about
> distinguishing attacks via installed font enumeration, text rendering
> engine differences, and font variants. There are a variety of tickets
> involved. This ticket is to track our progress.
>
> Here's an overview of our approach:
>
> In #13313, we introduced a Tor Browser pref, "font.system.whitelist",
> which accepts a list of fonts and excludes all others from the browser.
> We introduced a separate whitelist for OS X, Windows, and Linux.
>
> This whitelisting mechanism protects against font enumeration attacks,
> such as http://www.lalit.org/lab/javascript-css-font-detect/. Our
> whitelisting patch applies to CSS `font-family` and `src:local` (#17759)
> queries and also the Canvas `font` property. It does not prevent an
> attacker from identifying the operating system, nor from distinguishing
> two versions of an operating system by detecting different variants of
> the same font.
>
> In #16707 we whitelisted a largish set of fonts for Windows and OS X that
> are shipped with the operating system by default. In #17220 we added some
> standard Math fonts to the whitelist. And in #17250 and #17661, we
> expanded the font whitelist to include UI fonts found on some versions of
> Windows and OS X. See also #17999.
>
> David Fifield (dcf) wrote a script that fingerprints the user by
> measuring the bounding box of glyphs at certain code points. We found
> that different flavors of Linux render the same fonts differently and
> thus produce different fingerprints. We also expect different versions of
> Windows and Mac to also be distinguishable by font metrics. For the Linux
> case, we hope to adjust rendering settings and/or bundle rendering
> libraries to make the flavors indistinguishable: see #16672.
>
> We might also be able to reduce the effectiveness of fingerprinting
> attacks on all platforms by only allowed a limited number of font queries
> per URL bar domain: see #16312.
>
> Our #13313 patch whitelists fonts by name, but it likely allows a font
> installed on the system to supersede a font bundled with the browser. So
> we would consider changing the patch to whitelisting by font filename or
> restricting allowed directories for font loading: see #16739.
New description:
Defending against font fingerprinting is complex. We have to worry about
distinguishing attacks via differing installed font sets, text rendering
engine differences, and font variants. There are a variety of tickets
involved. This ticket is to track our progress.
Here's an overview of our approach:
In #13313, we introduced a Tor Browser pref, "font.system.whitelist",
which accepts a list of fonts and excludes all others from the browser. We
introduced a separate whitelist for OS X, Windows, and Linux.
This whitelisting mechanism protects against font enumeration attacks,
such as http://www.lalit.org/lab/javascript-css-font-detect/. Our
whitelisting patch applies to CSS `font-family` and `src:local` (#17759)
queries and also the Canvas `font` property. It does not prevent an
attacker from identifying the operating system, nor from distinguishing
two versions of an operating system by detecting different variants of the
same font.
In #16707 we whitelisted a largish set of fonts for Windows and OS X that
are shipped with the operating system by default. In #17220 we added some
standard Math fonts to the whitelist. And in #17250 and #17661, we
expanded the font whitelist to include UI fonts found on some versions of
Windows and OS X. See also #17999.
David Fifield (dcf) wrote a script that fingerprints the user by measuring
the bounding box of glyphs at certain code points. We found that different
flavors of Linux render the same fonts differently and thus produce
different fingerprints. We also expect different versions of Windows and
Mac to also be distinguishable by font metrics. For the Linux case, we
hope to adjust rendering settings and/or bundle rendering libraries to
make the flavors indistinguishable: see #16672.
We might also be able to reduce the effectiveness of fingerprinting
attacks on all platforms by only allowed a limited number of font queries
per URL bar domain: see #16312.
Our #13313 patch whitelists fonts by name, so it likely allows a font
installed on the system to supersede a font bundled with the browser if
they have the same font name. So we would consider changing the patch to
whitelisting by font filename or restricting allowed directories for font
loading: see #16739.
--
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18097#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs