[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5477 [EFF-HTTPS Everywhere]: Surprising DOM origins before HTTPS-E/NoScript redirects have completed
#5477: Surprising DOM origins before HTTPS-E/NoScript redirects have completed
-------------------------------------+--------------------------------------
Reporter: Drugoy | Owner: ma1
Type: defect | Status: reopened
Priority: blocker | Milestone:
Component: EFF-HTTPS Everywhere | Version:
Resolution: | Keywords: MikePerry201204
Parent: | Points: 7
Actualpoints: 7 |
-------------------------------------+--------------------------------------
Comment(by pde):
Mike, what I observe is the same as what you observe, and I believe the
vulnerability, if there is one, is state number 2.
On its face that does not look easily exploitable, but I think there are
at least theoretical grounds for concern. For example, an active network
attacker could induce state 2 and then drop a whole lot of packets or slow
them down to an absolute trickle. That might cause state 2 to persist for
30 seconds or longer, perhaps enough to trick a user into completing a
password dialog.
--
Ticket URL: <https://trac.torproject.org:443/projects/tor/ticket/5477#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs