Bug #8254

Do not reuse circuits for cross origin requests

Added by Anonymous 9 months ago.

Status:NewStart date:04/20/2017
Priority:NormalDue date:
Assignee:-% Done:

0%

Category:-
Target version:Orfox RC
Component:

Description

The Tor Browser draft includes defenses against cross origin linkability

I have not tested the other types in Orfox, but Orfox does not make new circuits for cross origin requests, making it possible for an attacker to use JavaScript to check if a user has visited another site recently (if they have a circuit built, the site will resolve much faster than if a circuit is not built yet).

I have tested this with Facebook's mobile onion site (https://m.facebookcorewwwi.onion/)

In my tests, having a circuit built already will resolve on average 3 seconds faster in XHR requests. I tried 10 requests with a circuit built to facebook already and 10 requests without.

Orbot Version Tested: 15.2.0-RC-8-multi(Tor 0.2.8.9armx86-openssl1.0.2j)
Orfox Version Tested: Fennec-45.5.1esr/TorBrowser-6.5-1/Orfox-1.2.1

Also available in: Atom PDF