[tor-bugs] #1517 [Tor Browser]: Provide JS with reduced time precision
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed May 6 18:28:20 UTC 2015
#1517: Provide JS with reduced time precision
-------------------------+-------------------------------------------------
Reporter: | Owner:
mikeperry | Status: needs_review
Type: | Milestone:
enhancement | Version:
Priority: major | Keywords: backport-to-mozilla, tbb-torbutton,
Component: Tor | tbb-fingerprinting-time-highres, ff38-esr,
Browser | TorBrowserTeam201505R, PearlCrescent201505R
Resolution: | Parent ID:
Actual Points: |
Points: 10 |
-------------------------+-------------------------------------------------
Comment (by mcs):
Replying to [comment:25 mikeperry]:
> Here's a patch that should make all JS clock sources and event
timestamps have 100ms resolution, except for keypress events, which should
have 250ms resolution: https://gitweb.torproject.org/user/mikeperry/tor-
browser.git/commit/?h=bug1517. It also clamps internal usage of
DOMHighResTimestamps to 1 microsecond, to avoid internal sidechannels and
other leaks.
Kathy and I reviewed this and the changes look OK. It is hard to say what
might break though.
One question: do you know how the ToMilliseconds() and ToMicroseconds()
calls inside xpcom/ds/TimeStamp.h are exposed to web content? Is
ToSeconds() exposed as well? If so, we should also reduce the resolution
of values returned by ToSeconds().
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1517#comment:30>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list