-
Notifications
You must be signed in to change notification settings - Fork 1.1k
HTTPS-E conflicts with NoScript in Tor Browser at Safest security setting when the EASE mode is enabled #17735
Comments
Please give more details about this issue. How does the conflict look like? |
I can reproduce this by using the "Safest" security level and setting EASE mode enabled. To reproduce:
Expect: The mixed content are upgraded, noticeably the tor browser shows a green padlock on the address bar. Actual: Mixed content warning appear. Ref: |
@cschanaj If there is mixed content, green lock never appears, even if it's rewritten, since MCB happens before WebExtensions sees the request (it can appear if all mixed content requests are blocked, for example if all of them are active). |
Having different behavior with NS on and off is strange, and should be investigated since we officially support Tor Browser. |
IIRC, this is because we injected the P.S. I think you can reproduce the expected behavior on Firefox with EASE mode is enabled (with only HTTPSE enabled) Possibly related #14961 |
High priority since this affects Tor Browser. |
Hi, I also experience the issue when using both HTTPS-Everywhere's EASE mode and uBlock Origin's advanced user mode: one of the extension won't be able to execute properly, the one that will fails will be randomly selected, and multiple reloads of the same page won't trigger the same behaviour. This is typical of the CSP conflict inherent to the design of WebExtensions. On a personal note, I think this issue is more problematic than it is treated as, because it breaks most privacy and security extensions, even approved and recommended by Mozilla ones. When multiple extensions use CSP injection, each of them will simultaneously create its own version of the response header from the base one and add their own parameters, but the resulting modifications won't be merged. Instead, one version is randomly selected (no factor affects this nor allows to determine in advance which extension will "win") and sent. NoScript avoids the randomness by setting its listeners in a loop, thus making it always prevalent over other extensions, which is why HTTPS-Everywhere's EASE mode will constantly be overriden when in conflict with NoScript. On another personal note, I'm hoping the Electronic Frontier Foundation or the Tor Browser's team will reach out to Firefox's developers to inform them of the severe impact this bug has on your respective software. The issue isn't as bad as it could be in Tor Browser Bundle thanks to the way NoScript sets its listeners, but that opens the door to a "listeners race" which could further aggravate the situation. Here is an issue that compiles a number of real life examples of CSP conflicts in popular extensions, as well as several Bugzilla tickets and Github issues relating to the problem: sticky: unofficial: the extension csp header modification game #664 If you need anything more (tickets, documentation, etc), please do not hesitate to ask. |
What's strange is that if you look at the network tab with EASE mode and the safest security setting, no HTTP requests are being made. |
This is not happening within Firefox with JavaScript completely disabled. I've notified Tor Browser developers of this strange behavior. |
Type: code issue
HTTPS-E conflicts with NoScript in Tor Browser at Safest security setting when the EASE mode is enabled. To test this use a mixedcontent website that normally would load under EASE mode with standard security setting. i wonder if it's possible to fix this in some way.
The text was updated successfully, but these errors were encountered: