-
-
Notifications
You must be signed in to change notification settings - Fork 345
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS Session Resumption Allows For Permanent User Tracking #768
Comments
First of all, thank you @ilikenwf for the discovery.
Then it will enable the TLS_v1.3 because no (at this moment) it isn't already the case.
What was the trouble with GitHub ? Warning because at the first time I wasn't enable to login...
|
Session resumption (either with session id or with encrypted tickets) is necessary to make fast connections to server. Without them browser will have to perform a complete TLS handshake on each connection. There are still websites configured to reset connection after every single HTTP request (to minimize server resources usage). With both session id and tickets disabled, browser will have to reconnect to such server for each image and script used on a page. This will slow down connections significantly. TLS 1.3 is not much of a solution. Without tickets it does allows you to reconnect without additional packet round trip, but both browser and server have to perform a public-key authentication, which it not a fast thing. However, HTTP/2 is a solution, because it elliminates a need for reconnect. A practical solution is for browser to expire session id's and tickets after a short period of time - about 2h. According to the paper, Firefox has 1 day validity period for sessions, which i think is too long. Additionaly, disallow session tickets use for cross-origin requests. That should make use of session tickets impractical for tracking purposes, but will still allow browser to load fast. A more advanced solution is possible - allowing longer storage of tickets from servers, if user has a saved password for it. Finally, while this is a valid concern, there is nothing sessions tickets of today's Firefox allow you to do, that is not possible with tracking IP addresses. |
Privacy and security are more important than fast connections...with the resume tickets disabled I notice no difference in speed. |
Just a little summary about WaterFox_v56.2.4 ! Since a few days there is one new warning (describe in this picture). |
no they aren't. |
Set this to 2:
|
See: |
|
How long till this is implemented, so we don't have to tinker it in about:config ourselves/share the link issue to our peers? |
I'm using ghacks user.js with a pretty large user.js file
personally...turned off even more stuff (all mozilla.org and google.com
telemetry except for addon updates), enabled some features ghacks disables,
and also setup tor's font list for my separate windows and linux installs.
I think it sets this too. https://github.com/ghacksuserjs/ghacks-user.js
…On Sat, Jun 22, 2019 at 11:09 AM SpiritBob ***@***.***> wrote:
How long till this is implemented, so we don't have to tinker it in
about:config ourselves/copy this link explaining the procedure to our peers?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#768>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AADFIOVAA75TD7E45LNFUWLP3YB5BANCNFSM4F6CHWOA>
.
|
Warning : |
If the intention is to lock these preferences in mainstream distributions of Waterfox:
|
I've tried this config in my own Waterfox profile before, but some of these settings broke too many needed websites for me, to the point I had to revert it. |
You're right @laniakea64 because it could be a trouble sometimes. That's why these settings could break a website. |
No.
Watch your language; mind your manners.
Yes, including your earlier complaint about Alex not rectifying things, from which a person might assume that some other comments also require Alex to change things for you, and for other users of the application. If #768 (comment) was not about changes to the application you should have made it clear. Re: language, please be aware that the word warning is sometimes admonitory e.g. "… wagging an admonitory forefinger.". Perceptions such as finger-wagging may be likely where, for example, a person has previously complained about other people not doing things soon enough. |
Another liar ! Because this time it's obvious. My language ? Well there is nothing wrong because you can't even be polite (hello, thanks, etc). As you can guess now it's over and I won't try to help this project anymore. For the record, remind me who has report this issue ? Indeed it was myself and you didn't even take one tiny time to say something like : thank you WagnerGMD because you are right. The trouble wasn't rectify ! PS : By the way @MrAlex94 there is nothing strange. I was absent for several months and my behavior is normal. After all, you can blame @grahamperrin which has create this situation. |
@WagnerGMD, this is the last time I am going to reply to your rude comments, and if you carry on, I'll have to block you - your rudeness is spreading to other people now who volunteer their time to help with Waterfox. Now, I'm going to reply to your very first comment about TLS 1.3 support. Please note this comment from an OpenBSD developer who knows exactly what he's talking about: "Since there is effectively nothing wrong with TLS 1.2 with a sanely chosen cipher suite today, we believe a clean careful implementation is more beneficial than early adoption." I don't think there has been any reason to think that anything has changed in regards to security using TLS 1.2 with good cipher. TLS 1.3 is supported in Waterfox Current if it is specifically needed for whatever reason. Next, stop calling people liars as you clearly have a lack of understanding for the meaning of the word. Also, this is an issue tracker, not a off-topic discussion forum. It's implied within the context of the issue that you're offering some sort of solution for Waterfox. I'm going to say this as kindly as I can. Unless you can provide level headed discussion, please do not comment at all. |
I can confirm that with the below options set as shown, the SSLLabs test confirms my TLS "tickets" are disabled. Both entries must be created if added manually.
security.enable_tls_session_tickets
to falsesecurity.ssl.disable_session_identifiers
to trueSSL Labs Test: https://www.ssllabs.com/ssltest/viewMyClient.html
The text was updated successfully, but these errors were encountered: