[tor-bugs] #13496 [Applications/Tor Browser]: Write test for spoofed navigator* values in workers

Tor Bug Tracker & Wiki blackhole at torproject.org
Sun Nov 10 07:57:18 UTC 2019


#13496: Write test for spoofed navigator* values in workers
--------------------------------------+---------------------
 Reporter:  gk                        |          Owner:  gk
     Type:  task                      |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:  ff38-esr, tbb-testcase    |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+---------------------

Comment (by Thorin):

 Replying to [comment:1 gk]:
 > A preliminary test is in bug_13496 in my public test repo. Reminder:
 don't forget to test nested workers.

 I think we can close this. Override prefs are not used anymore see tom's
 comment - https://trac.torproject.org/projects/tor/ticket/27268#comment:18
 "Yeah all of these should be deleted from tor's js file. With RFP enabled
 they do nothing"

 ---

 PS: FYI: I know this is not what the ticket was for, but you can go to
 https://securehomes.esat.kuleuven.be/~gacar/dev/worker_test.html which
 shows web workers return RFP values (although some spoofed values are the
 real values, e.g Win32 on windows machines) - I might add this to TZP but
 it's probably a waste of time

 PPS: do you want me to test RFP UA spoofing in nested WebWorkers? Or would
 that also be a waste of time - anyway, feel free to close this

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13496#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list