[tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jan 23 16:51:47 UTC 2014


#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
     Reporter:  mikeperry            |      Owner:  mikeperry
         Type:  task                 |     Status:  needs_review
     Priority:  major                |  Milestone:
    Component:  Firefox Patch        |    Version:
  Issues                             |   Keywords:  tbb-fingerprinting,
   Resolution:                       |  tbb-pref, MikePerry201401R
Actual Points:                       |  Parent ID:
       Points:                       |
-------------------------------------+-------------------------------------

Comment (by oc):

 I'm discovering that we do not have the same user model:
 * I only use TBB for a few specific tasks, while everything else I do with
 a regular browser.
 * You are promoting TBB as the main/only browser, in which case CUPS (et
 al) should be accessible indeed.

 Replying to [comment:16 cypherpunks]:
 > {{{
 > # Prevent Internet sites from requesting LAN resources.
 > Site LOCAL
 > Accept from LOCAL
 > Deny
 > (...)
 > # Prevent 127.0.0.1 from requesting Internet resources.
 > Site ALL
 > Deny from 127.0.0.1
 > }}}

 Your ABE rules seem to work ok here.
 Can 127.0.0.1 access LOCAL or not? I cannot check this myself because of
 other (related) problems:
 * LAN IPs are blocked anyway:
 {{{
 [warn] Rejecting SOCKS request for anonymous connection to private address
 [scrubbed]
 }}}
 * 127.0.0.1 works but localhost does not.
 Am I the only one experiencing those?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:17>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list