[tbb-bugs] #28174 [Applications/Tor Browser]: Block non-.onion subresources on .onion websites?

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 24 06:43:58 UTC 2018


#28174: Block non-.onion subresources on .onion websites?
------------------------------------------+----------------------
     Reporter:  arthuredelstein           |      Owner:  tbb-team
         Type:  defect                    |     Status:  new
     Priority:  Medium                    |  Milestone:
    Component:  Applications/Tor Browser  |    Version:
     Severity:  Normal                    |   Keywords:
Actual Points:                            |  Parent ID:
       Points:                            |   Reviewer:
      Sponsor:                            |
------------------------------------------+----------------------
 Right now, .onion sites can load HTTP or HTTPS subresources (scripts,
 images, etc.).

 But is this safe? Loading non-.onion subresources means we are potentially
 leaking information including:
 * the .onion domain
 * the full top-level .onion URL
 * other information about the content of the page
 * the list of subresources requested by a .onion page

 Leaks might happen by referer, fetch request, query string, etc. (I
 haven't tested these yet and I'm not sure what leaks happen in practice.)
 Such leaks would be particularly bad for "stealth" onion sites.

 Even worse, some of the non-.onion subresources may leak the onion site's
 IP address. For example, a .onion website improperly configured may
 accidentally include URLs pointing to their own server's non-.onion IP
 address. Loading those subresources leaks the IP address not just to the
 user but to anyone watching connections outside the Tor network.

 While it's true that warnings in [https://docs.google.com/document/d
 /1bPrNLIl7Qy-sA7aTfElu80Xk2eXzTfH_5BGTOUDK8XU/edit Tor Browser's URL bar
 .onion icons] from #23247 help a little (especially with HTTP
 subresources), they don't show any warning when onion sites from load
 non-.onion HTTPS subresources. And a warning icon is actually too late --
 the subresource has already been requested by the time a user sees the
 warning.

 So, my question is: should we apply a more strict blocking rule? Possible
 alternative rules could be:
 1. No non-.onion subresources can be loaded from a .onion site.
 2. No "active" non-.onion subresources can be loaded from a .onion site.

 I guess it depends on how many existing onion sites we break. But my
 feeling is that allowing mixed content was a mistake for HTTPS sites and
 we should avoid making the analogous mistake.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28174>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tbb-bugs mailing list