[tor-bugs] #13496 [Applications/Tor Browser]: Write test for spoofed navigator* values in workers
Tor Bug Tracker & Wiki
blackhole at torproject.org
Sun Nov 10 07:57:18 UTC 2019
#13496: Write test for spoofed navigator* values in workers
--------------------------------------+---------------------
Reporter: gk | Owner: gk
Type: task | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ff38-esr, tbb-testcase | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+---------------------
Comment (by Thorin):
Replying to [comment:1 gk]:
> A preliminary test is in bug_13496 in my public test repo. Reminder:
don't forget to test nested workers.
I think we can close this. Override prefs are not used anymore see tom's
comment - https://trac.torproject.org/projects/tor/ticket/27268#comment:18
"Yeah all of these should be deleted from tor's js file. With RFP enabled
they do nothing"
---
PS: FYI: I know this is not what the ticket was for, but you can go to
https://securehomes.esat.kuleuven.be/~gacar/dev/worker_test.html which
shows web workers return RFP values (although some spoofed values are the
real values, e.g Win32 on windows machines) - I might add this to TZP but
it's probably a waste of time
PPS: do you want me to test RFP UA spoofing in nested WebWorkers? Or would
that also be a waste of time - anyway, feel free to close this
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13496#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list