brave / brave-browser

Brave browser for Android, iOS, Linux, macOS, Windows.
https://brave.com
Mozilla Public License 2.0
17.92k stars 2.34k forks source link

mitigate TLS session resumption tracking #1852

Open diracdeltas opened 6 years ago

diracdeltas commented 6 years ago

since https://arxiv.org/abs/1810.07304 came out, many people are concerned about the possibility of advertisers tracking people using TLS session resumption data. brave should consider invalidating TLS session resumption tickets periodically to mitigate this.

jumde commented 6 years ago
diracdeltas commented 5 years ago

discussed in meeting;

WRT tor, if this is not provided by site isolation then we should probably disable TLS ticket caching entirely

fmarier commented 5 years ago

Here are the notes I took after reading the suggested mitigations in that paper:

diracdeltas commented 5 years ago

thanks @fmarier

my current thinking is this would be ideal:

diracdeltas commented 5 years ago

actually according to https://bugs.chromium.org/p/chromium/issues/detail?id=30877, chromium OTR sessions (aka incognito windows) should have session resumption disabled already. if that's the case, Tor mode is protected already

tildelowengrimm commented 5 years ago

Is Tor actually an OTR session though — do guest windows have the same treatment?

riastradh-brave commented 5 years ago

The question about guest sessions will become moot after #2307.

It is unclear to me whether TLS session resumption is actually disabled altogether in off-the-record profiles, or whether it is merely partitioned between normal and off-the-record profiles; this part needs investigation.

That said, upstream is preparing to isolate TLS session caches by network isolation key, which will be the first party, rendering this entirely moot: http://crbug.com/974910

bsclifton commented 3 years ago

@diracdeltas @darkdh would this be fixed now that Tor uses OTR profile? https://github.com/brave/brave-core/pull/7069