[tor-bugs] #13766 [Tor Browser]: Raise MaxCircuitDirtiness for Tor Browser (to Infinite)?

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Jan 19 19:50:57 UTC 2015


#13766: Raise MaxCircuitDirtiness for Tor Browser (to Infinite)?
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  tbb-team
  mikeperry              |     Status:  new
         Type:  defect   |  Milestone:
     Priority:  normal   |    Version:
    Component:  Tor      |   Keywords:  tbb-usability, TorBrowserTeam201501
  Browser                |  Parent ID:
   Resolution:           |
Actual Points:           |
       Points:           |
-------------------------+-------------------------------------------------

Comment (by mikeperry):

 Replying to [comment:6 mikeperry]:
 > The updater is another thing that may be affected by this. We probably
 want to ensure we are sending a unique, new nonce as the SOCKS password
 field for updater requests (both to
 https://www.torproject.org/projects/torbrowser/RecommendedTBBVersions and
 to the update manifests at
 https://dist.torproject.org/torbrowser/update_2/).

 At the same time, we want to avoid guard discovery attacks here (see
 https://trac.torproject.org/projects/tor/ticket/7870#comment:18). This
 means we want to not give content elements on random websites the ability
 to generate a ton of script tags with the src set to
 https://www.torproject.org/projects/torbrowser/RecommendedTBBVersions, for
 example.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13766#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list