[tor-bugs] #32865 [Applications/Tor Browser]: Setting Origin: null header still breaks CORS in Tor Browser 9.5
Tor Bug Tracker & Wiki
blackhole at torproject.org
Fri Jan 3 18:24:03 UTC 2020
#32865: Setting Origin: null header still breaks CORS in Tor Browser 9.5
--------------------------------------+--------------------------
Reporter: micahlee | Owner: tbb-team
Type: defect | Status: new
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+--------------------------
Comment (by alecmuffett):
Replying to [comment:4 gk]:
> Huh! We _are_ following web standards here. You might enjoy reading:
https://tools.ietf.org/html/rfc6454#section-7.3. I'll quote the relevant
part for you:
> {{{
> Whenever a user agent issues an HTTP request from a "privacy-
> sensitive" context, the user agent MUST send the value "null" in the
> Origin header field.
> }}}
> Note the `MUST` here. I think assuming that .onion sites are privacy-
sensitive is a good default, as well.
I stand corrected re: the text, but I differ on the presumption that all
".onion" sites are privacy-sensitive by default; because (apart from
anything else) that you describe this as a "default" suggests there is a
way to override the behaviour.
I am not aware of a way for a website to declare to Tor Browser, that it
should override this behaviour? Am I again wrong?
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/32865#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list