[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-dev] #3600 tech doc
- To: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [tor-dev] #3600 tech doc
- From: Richard Pospesel <richard@xxxxxxxxxxxxxx>
- Date: Fri, 18 Jan 2019 12:59:43 -0800
- Autocrypt: addr=richard@xxxxxxxxxxxxxx; prefer-encrypt=mutual; keydata= mQINBFnAGv8BEACeqywkP5Bb917JJKOEMObLpvHKIHXhbNTA1K0lh6bvX/prYaCnxtLpR9OO W1s1FUvox0BSh7um15dj3gMrkHUmMtIOlKd+K8kgjI6z145wjZ+Xt/pB92i3ROUvUJRz3ION dzMQmGnsuPDDmz+1VnrHyKE1dr2qXYyejTPeJAJM2eO78dlWoUhi2am17+Hna6HjRMktFFb1 NSEr//I0NR1BbsXOVvn0Pt3dYyHcWiBt2k4ew7sfgFMVtNW5qvfyYB78hGt6xFNp0C8acrQT 0k0unlo8vr7Vdh1oOc6b/tsV0ebjUqhU4LIvHKUzsY5K1kaqjx/lmMCRvF9BX4gGfd0LqLuC UOwsNywP74n0ZG3tPx+tLEZxKt1Yd4pEs9hXKGLtmch7PATnAlW73s8Acb7il7qQQsGHtACb f/BPjXQS2yz8O5+KLhQ+UNTzI1w9N9fVpAyMfbFHdl4yTmZr5bjet23jOpfFRxOIGFbbyNE8 q010u+iN28t7pNS17VcqUxq4u+ED1txB+HciTA1RfNHCI/2Y+r8GOPT+1uk6TMkNEr0FyjJU yHJDyitzwHubq46KnKdAAG1Q0/+e99CmGCGQXrj3YvoB4+EhGQjeuTvGBzoVNSIYFHBsGHxi Yvz4BMksbg/eoSY6PBPnI6corSO0a8RbSvqUY5KLXdUkWbJxjQARAQABtClSaWNoYXJkIFBv c3Blc2VsIDxyaWNoYXJkQHRvcnByb2plY3Qub3JnPokCPQQTAQgAJwUCWcGl/gIbIwUJCWYB gAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDeRzYDY/NLLDWXD/9UN1Pdevf8Pbhcadr6 SJTvdYH6y+dkMaLLR2Pd3l645Bn1cY9Be5Azw86jwFnaP+hH2rPrEG9jGyU/xpIPRLiA0Tl2 9QLopD6KIb2mc6SCosEVa8WNV9eJ5YvRM66QmNQHJT0eZkk4th/EUZkqy66NohtilSIIMc5o 0a4xMCmB61URDoReQckzAfujSTfeMhJkfyW5uYg9xvH2/deM1JPq+J/xBOdiMRZswM1E+KVN eIRnD3vvtpZ7i+UW82ExAxhm1ubcX3vwcGd7bKYR+jg7QcBienwUNrXDVlfZ3tvH/clkyZZa E2nQeyeBzFYGm+mxhDoA6Ivv0XfDOCHg9kcYaQBdskbBN8PlezaW+CmBmdeWR3ED5Y/vX6ud rlwJ4lJ3XZFrL/zRbIuJgWlUe6kEqy7RyUNhnhS/4svRlI8fsU8NBQj5QCsxSI6FkQxrchAO VhmV8xhyIg54+/e3jKYPhBWvS9Y/B4SzFvGbya7+U//ucDRTGyNGcwQA2l9TJYYFOqZb6Ws+ 0/pa54smTFwChqysVPRXA6S2L0GIZppSQATLkhLj6trqbDihfU53za255w8GWRShZz8Os3g3 QaUmQI8aHTO2Beea4QJ1fpJLkpgaJ5U6Gmleo0OANChLkkF3xeQfKsXYS+bcmH5jpgO2z9l6 gV8DhBYK29eqVaArwrkCDQRZwBr/ARAA17GeN7sK1XkshfK22jh8cOli70Xv+4nkFucodxy1 FtAHbthJ61Cce/9F+8tZgV+Ect186z3ANs997Wm/BvcfiiKIDsT0sWpV6SdHIgeTM3FJIsFu 2lZyDSN9J4B4XMBw5jshwcSqf74qYrIlq0c6QD1JDAcB9Oa5FRm4i5SoJZUh/181pr8C1kuo ajaEE5PhVz2+GU2FoSl9AV6WzzuR9DQponC0kyulPWq3TO2sFto64XSQ6imd2ZM1f5r6zmTn RzsxL3mJmzAKy7TwkkqhWTi71brSbA69O9hJyLKAXEhCIfw0tVjE/IzAD/T3h9FeXcfRlvq6 U9GM3dCNbLMIAJSXpOvvio4ZD1p2tZYrajF9roqf4vXNuCvx7mP3TFO4saYe2h8egeim8v9D m40qr58FaPYl8e4z7EFpW07mvUKMXe9yshEBdOcWIk4MbLPij2yk0rfIXjFHCaJnezL5Ayad gD1mtkY/r1WQm6Z8hMDulbCmQ4913AUg9efXeX5LjMrou1SptPNooD1z8bQtciXMHCV7AjSU Hnm+dPdYA1n7HIPNWTZ7KLz9+26vLtZEalBm8cjMJddWEiH1nncVggC8EKuxvRa9mOrYJ2qZ eXmlGK7LLEDxc5j/fCUv64naduIo25IxCpf8CdjnOx5SNYCKmNT9Jt66hjt8s67KpS0AEQEA AYkCJQQYAQgADwUCWcAa/wIbDAUJCWYBgAAKCRDeRzYDY/NLLOuJD/9nfyJebL4WXazUeoit 38Dsb28BXSpbJBVBTwjETU9my1dlET51U0Yf/N3AWssHxMjyKsbPW0P0aftBy64i1iqBwjs1 plFGzArlaIwYrYkF+YulbWscLjQGMr9gwoSAAicIq0LbJITy2Fr/xhv0JccwPiU1WXy4k4wS Fu93fqL5xwTHgkZvw/K86ujoczQksxtdDCU2GIvQdKHAMBkSsW9KhlhBUNXM99BPibSMkKmF 6TuiKLoZ23oT5W4IIcyi/0U0Le/yGWFXJtyBGFT3Ul6ulDehjzd8ixXyWW/5bngPx7E/EUGq pp6iarNsj02FJeSIMy8KM32ZmGpaBWIU62To0uW4INiNihn6FFz4O/GgPGG9iWot/+MpTIfO 76TxIQ/Gwza13XISH1jlBiXE9P9VMqfczggxz+YAVNbeHmdBpnjJRyVtSmEoD5am/zhD6qHw gcoEFIrIumY71CRpqGnQ+Ll7gUVvb3zPGhP4oQZqwkoUWaU/KU2Nut42u6hzxcHFhAPjgp1Y dzFQt/jpihRcNz6vn0UtmY6/i0h68ybIVHxbarndyI7uKnUqqetDqjNPjK9w3l6kjRn/Nilg bwzAEYjMx37I848+vEtc97VpiXKGKYNLosLec6HWntpdRac0toTunwLljHxvlrKu7r06rZgW FitEw4xp3JUlTbtWvw==
- Delivered-to: archiver@xxxxxxxx
- Delivery-date: Fri, 18 Jan 2019 16:00:00 -0500
- In-reply-to: <4cca4553-5fdd-4a47-8fa4-18ae8c25617a@torproject.org>
- List-archive: <http://lists.torproject.org/pipermail/tor-dev/>
- List-help: <mailto:tor-dev-request@lists.torproject.org?subject=help>
- List-id: discussion regarding Tor development <tor-dev.lists.torproject.org>
- List-post: <mailto:tor-dev@lists.torproject.org>
- List-subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=subscribe>
- List-unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-dev>, <mailto:tor-dev-request@lists.torproject.org?subject=unsubscribe>
- Openpgp: preference=signencrypt
- References: <e988c89b-f5af-ca6f-e83d-30ca5c111857@torproject.org> <3a5f58c2-3198-a548-263c-bc6a06431b3f@torproject.org> <4cca4553-5fdd-4a47-8fa4-18ae8c25617a@torproject.org>
- Reply-to: tor-dev@xxxxxxxxxxxxxxxxxxxx
- Sender: "tor-dev" <tor-dev-bounces@xxxxxxxxxxxxxxxxxxxx>
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
For background: Currently with first-party isolation enabled if foo.com embeds
content from bar.com the cookies we would send to bar.com would come from the
foo.com|bar.com double-keyed bucket, whereas if we were to visit bar.com
directly the cookies used would just come from the bar.com bucket. This way
embedded bar.com content requests don't get correlated with first-party bar.com
sessions (and vice-versa).
So the idea behind the proposed 'Expand First Party Double-Keying Scheme to
Redirect Content' is that we treat redirected content the same as we currently
treat embedded content now by double-keying. If foo.com redirects to bar.com, we
treat the originating foo.com as the first-party domain and subsequent cookies
saved by/sent to bar.com would use the foo.com|bar.com bucket, as if bar.com was
embedded content in foo.co
Con 1 outlines the common scenario where websites will squat on similar or old
domains that redirect to the correct one (ie gogle.com -> google.com or
wachovia.com -> wellsfargo.com). So, suppose foo.com redirects to bar.com and
the user then logs in to their bar.com account. Due to the redirect, your
session cookie bar.com directs you to store after a successful login will be
saved in the double-keyed foo.com|bar.com bucket. This is fine so long as the
user always gets to bar.com via the redirect, but if the user learns the new url
and now navigates to bar.com directly (rather than from the foo.com redirect),
they would be pulling cookies from the bar.com bucket directly since there was
no redirect and bar.com would be the first-party. Thus, you would have two
concurrent session cookies, one in the bar.com bucket and one in the
foo.com|bar.com bucket. If the user is trying to juggle multiple identities,
then accidental use of the wrong account is one typo away.
The Double-Keyed Redirect Cookies + 'Domain Promotion' tries to fix this
multiple/hidden session problem by promoting the cookies of double-keyed
websites to first-party status in the case where the originating domain is
positively identified as solely a redirect. In the gogle.com -> google.com
scenario, if Tor Browser could identify that gogle.com is used solely to
redirect to google.com, then we could take the double-keyed gogle.com|google.com
cookies and move them into the google.com bucket and eliminate the double
session.
I hope that clears things up.
best,
- -Richard
On 1/11/19 9:05 AM, Georg Koppen wrote:
> Richard Pospesel:
>> And here's a link that actually works:
>> https://storm.torproject.org/shared/Kw99Ow0ExZFFC6FKD5CeryfVFAoAL9Z_iEVlflI0fiL
>
> Thanks for collecting and sharing all the possible ideas here. Some
> comments come to mind after thinking a bit about it.
>
> 1) We probably won't get that feature right in our first attempt (let's
> assume there is something like "right" here at all), so I would not want
> to spend too much time trying to fix all the rabbit holes we find while
> thinking about and implementing fixes. In particular, I'd suggest we try
> to ignore the scenario that identifiers, cookies etc. get somehow passed
> on in the URL bar over redirects for now. Dealing with tracking
> information in URLs is a tricky topic of its own and somewhat orthogonal
> to redirects.
>
> 2) For Tor Browser I think I am currently most interested in the "Expand
> First Party Double-Keying Scheme to Redirected Content" scenario, thus
> I'd like to look a bit closer at it. Looking over the Cons I don't see
> OAuth and similar authentication mechanisms being broken, is that
> correct? If so, great, and certainly a plus.
>
> I think I don't understand the scenario in Con 1, that is how a user can
> effectively end up with two simultaneous identities depending on whether
> they came from https://gogle.com/ or https://google.com/. For instance,
> if I enter https://gogle.com, why should I end up with a different
> identity than coming from https://google.com? https://gogle.com is not
> even settings cookies, but even if it were the final response from
> google.com is a 200 with a Set-Cookie header (among other things). That
> cookie would I sent back regardless once I decide I want to log in. The
> same happens in the scenario where I already had been logged into Google
> before I think.
>
> 3) I am not sure about Con 2 yet, but another thing we can keep in mind
> is that we have the New Identity feature against powerful
> trackers/longterm tracking. If we don't find a solution to Con 2 I think
> pointing to that defense as a stop gap is not the worst idea. At any
> rate I feel not having a solution right now to that one should not stop
> us from experimenting.
>
> Georg
>
>
> _______________________________________________
> tor-dev mailing list
> tor-dev@xxxxxxxxxxxxxxxxxxxx
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>
-----BEGIN PGP SIGNATURE-----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=AKFt
-----END PGP SIGNATURE-----
_______________________________________________
tor-dev mailing list
tor-dev@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev