[tbb-dev] Data Leak: Disable old, unencrypted OCSP verification in TBB.
Richard Pospesel
pospeselr at riseup.net
Tue Aug 23 16:18:46 UTC 2022
opened https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41115
On 8/23/22 16:01, elise.toradin at web.de wrote:
> Hi, sadly I noticed that OCSP (security.OCSP.enabled) is still enabled in the latest TBB, I hope you
> are all aware that this data is sent unencrypted and can be used by CA's to track users.
> OCSP Stapling has been a common feature of web servers since 2017, so I suppose we should rely on
> that instead?
> Firefox is configured to use OCSP Stabling by default, but I still see an unencrypted OCSP
> connection for every https:// connection.
> security.ssl.enable_ocsp_stapling = true
> security.ssl.enable_ocsp_must_staple = true
>
> security.OCSP.enabled = 0
> Best Regards,
> Elise
>
> _______________________________________________
> tbb-dev mailing list
> tbb-dev at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tbb-dev
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xDE47360363F34B2C.asc
Type: application/pgp-keys
Size: 5560 bytes
Desc: OpenPGP public key
URL: <http://lists.torproject.org/pipermail/tbb-dev/attachments/20220823/c67d5a18/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tbb-dev/attachments/20220823/c67d5a18/attachment.sig>
More information about the tbb-dev
mailing list