[tor-bugs] #10419 [Firefox Patch Issues]: Can requests to 127.0.0.1 be used to fingerprint the browser?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Jan 23 18:30:59 UTC 2014
#10419: Can requests to 127.0.0.1 be used to fingerprint the browser?
-------------------------------------+-------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: task | Status: needs_review
Priority: major | Milestone:
Component: Firefox Patch | Version:
Issues | Keywords: tbb-fingerprinting,
Resolution: | tbb-pref, MikePerry201401R
Actual Points: | Parent ID:
Points: |
-------------------------------------+-------------------------------------
Comment (by cypherpunks):
(cypherpunks2)
Oh God, so Firefox considers alternative IP address representations (like
2130706433 for 127.0.0.1) equivalent and lets them through, while
Noscript's ABE considers them to differ and thus the rules don't catch.
I like unsticking the printer queue without starting another browser as
much as the next guy, but this is where one could start to lean towards
saying fuck it, setting extensions.torbutton.no_proxies_on="", and getting
the hell outta Dodge.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10419#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list