[tbb-commits] [torbutton/master] Bug 19206: Include a 128 bit random tag as part of the domain isolator nonce.
gk at torproject.org
gk at torproject.org
Fri Jun 10 14:34:35 UTC 2016
commit 0fbd44f0305a01a14bc7439f5ad66b59d9278a2d
Author: Yawning Angel <yawning at schwanenlied.me>
Date: Tue Jun 7 19:01:41 2016 +0000
Bug 19206: Include a 128 bit random tag as part of the domain isolator nonce.
When creating a domain isolation nonce, 128 bits of entropy is drawn
from a cryptographic source and saved on a per-domain basis. The new
circuit behavior is changed to regenerate the nonce, instead of
incrementing a counter.
This allows the "right thing" to happen when the same tor instance is
used across multiple Tor Browser sessions, for example when using a
system wide tor, or a magic anonymity box.
---
src/components/domain-isolator.js | 36 ++++++++++++++++++++++++++----------
1 file changed, 26 insertions(+), 10 deletions(-)
diff --git a/src/components/domain-isolator.js b/src/components/domain-isolator.js
index 6cfd21e..769c47d 100644
--- a/src/components/domain-isolator.js
+++ b/src/components/domain-isolator.js
@@ -16,6 +16,9 @@ const Cc = Components.classes, Ci = Components.interfaces, Cu = Components.utils
let logger = Cc["@torproject.org/torbutton-logger;1"]
.getService(Components.interfaces.nsISupports).wrappedJSObject;
+// Import crypto object (FF 37+).
+Cu.importGlobalProperties(["crypto"]);
+
// ## mozilla namespace.
// Useful functionality for interacting with Mozilla services.
let mozilla = {};
@@ -69,7 +72,7 @@ tor.socksProxyCredentials = function (originalProxy, domain) {
// Check if we already have a nonce. If not, create
// one for this domain.
if (!tor.noncesForDomains.hasOwnProperty(domain)) {
- tor.noncesForDomains[domain] = 0;
+ tor.noncesForDomains[domain] = tor.nonce();
}
let proxy = originalProxy.QueryInterface(Ci.nsIProxyInfo);
return mozilla.protocolProxyService
@@ -77,21 +80,34 @@ tor.socksProxyCredentials = function (originalProxy, domain) {
proxy.host,
proxy.port,
domain, // username
- tor.noncesForDomains[domain].toString(), // password
+ tor.noncesForDomains[domain], // password
proxy.flags,
proxy.failoverTimeout,
proxy.failoverProxy);
};
-tor.newCircuitForDomain = function(domain) {
- // Check if we already have a nonce. If not, create
- // one for this domain.
- if (!tor.noncesForDomains.hasOwnProperty(domain)) {
- tor.noncesForDomains[domain] = 0;
- } else {
- tor.noncesForDomains[domain] += 1;
+tor.nonce = function() {
+ // Generate a new 128 bit random tag. Strictly speaking both using a
+ // cryptographic entropy source and using 128 bits of entropy for the
+ // tag are likely overkill, as correct behavior only depends on how
+ // unlikely it is for there to be a collision.
+ let tag = new Uint8Array(16);
+ crypto.getRandomValues(tag);
+
+ // Convert the tag to a hex string.
+ let tagStr = "";
+ for (var i = 0; i < tag.length; i++) {
+ tagStr += (tag[i] >>> 4).toString(16);
+ tagStr += (tag[i] & 0x0F).toString(16);
}
- logger.eclog(3, "New domain isolation count " +tor.noncesForDomains[domain] + " for " + domain);
+
+ return tagStr;
+}
+
+tor.newCircuitForDomain = function(domain) {
+ // Re-generate the nonce for the domain.
+ tor.noncesForDomains[domain] = tor.nonce();
+ logger.eclog(3, "New domain isolation for " + domain + ": " + tor.noncesForDomains[domain]);
}
// __tor.isolateCircuitsByDomain()__.
More information about the tbb-commits
mailing list