[tor-bugs] #5752 [Tor]: Isolate browser streams by url bar domain rather than by time interval
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Jan 28 18:21:55 UTC 2014
#5752: Isolate browser streams by url bar domain rather than by time interval
-------------------------+---------------------------------
Reporter: arma | Owner:
Type: project | Status: new
Priority: normal | Milestone: Tor: unspecified
Component: Tor | Version:
Resolution: | Keywords: SponsorZ tor-client
Actual Points: | Parent ID:
Points: |
-------------------------+---------------------------------
Comment (by mikeperry):
George Danezis pointed out that there is currently a rather extreme
vulnerability in Tor's path selection that we might want to try to fix as
part of this. It turns out that if you make your exit allow a very rare
port (like 25), you can cause clients to use that exit frequently by
ensuring that content elements sourced from port 25 are injected. Once you
get Tor to create a circuit for this port, it will currently keep using it
for other connections on other ports that are allowed at that exit for at
least 10 minutes. We should avoid this behavior if we can in the domain
isolation implementation.
One option might be to treat such rare port stream requests as their own
isolation, which may or may not be what Tor does with SOCKS
username+password right now (does anyone know?)
FWIW: I think this attack might not actually work with port 25, because
Firefox will refuse the load before Tor even gets the stream request due
to port 25 being a banned port from the browser, but there may be other
rare exit ports that can be abused for this purpose that Firefox will
allow.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5752#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list