[tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Jan 24 18:58:49 UTC 2014


#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
     Reporter:  mikeperry            |      Owner:  mikeperry
         Type:  task                 |     Status:  needs_review
     Priority:  major                |  Milestone:
    Component:  Firefox Patch        |    Version:
  Issues                             |   Keywords:  tbb-fingerprinting,
   Resolution:                       |  tbb-pref, MikePerry201401R
Actual Points:                       |  Parent ID:
       Points:                       |
-------------------------------------+-------------------------------------

Comment (by cypherpunks):

 Replying to [comment:26 oc]:
 > on my machine, a 127.0.0.1 ABE rule ''does'' catch 2130706433?

 '''It looks as if Noscript normalizes IP addresses only for "Site x.x.x.x"
 directives, but not for ''predicates'' e.g. "Deny from x.x.x.x".'''

 If I test the second rule from comment 16 with a local webserver serving a
 page including a remote image, the image loads when accessing the server
 through 127.0.0.1, but not when accessing it through 2130706433.

 However a flat out
 {{{
 Site 127.0.0.1
 Deny
 }}}
 means I cannot access the server itself through either address, which is
 what you may have tested.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list