[tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jan 23 09:07:50 UTC 2014


#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
     Reporter:  mikeperry            |      Owner:  mikeperry
         Type:  task                 |     Status:  needs_review
     Priority:  major                |  Milestone:
    Component:  Firefox Patch        |    Version:
  Issues                             |   Keywords:  tbb-fingerprinting,
   Resolution:                       |  tbb-pref, MikePerry201401R
Actual Points:                       |  Parent ID:
       Points:                       |
-------------------------------------+-------------------------------------

Comment (by gk):

 Replying to [comment:13 mikeperry]:
 > I think that oc is right about not needing to browse localhost from TBB.

 What about configuring CUPS from the browser? At least I am used to it.
 And the need for two browsers (a TorBrowser and, say, a vanilla Fx) bears
 the big risk that the users mess things up. So, if we see the need for
 removing "access" to 127.0.0.1 from the outside then we should make sure
 that the user itself is still able to reach things on 127.0.0.1 IMO.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:14>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list