[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #20146 [Applications/Tor Browser]: Tor browser certificate pinning bypass for addons.mozilla.org and other pinned sites
#20146: Tor browser certificate pinning bypass for addons.mozilla.org and other
pinned sites
--------------------------------------+--------------------------
Reporter: mancha | Owner: tbb-team
Type: defect | Status: new
Priority: Immediate | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Critical | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by jmprcx):
Greetings folks,
Just wanted to add some input here and much respect to all for fixing this
problem.
The Mozilla-proposed solution is garbage to my understanding. If HPKP pins
are used I believe they get wiped in private browsing mode so then it
offers no protection on the next startup. HPKP pins can also be used as a
method to track user activity so some users may not want to store pins.
I like option 2 as proposed. Also maybe it would be worthwhile to do add-
ons over onion service only? I don't see a point in making a Tor Browser
user beacon out to the clearnet for no good reason.
-jmprcx
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20146#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs