-
Notifications
You must be signed in to change notification settings - Fork 522
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FYI: CSS-only tracking [moot], CSS Injection [use CSS Exfil Protection] #343
Comments
Same for me. |
I'm glad you posted this update Pants...I was sitting here trying to figure out what could have spoofed your results haha.
I'm curious of this as well, as the test page successfully picks up my hovering, for example. Do you have |
Huh, I don't have Calibri font BTW |
Cookies are needed...I turned them off and nothing got reported |
The test page hacks a .php call from the .css (actually the main.css invokes screen.css and that invokes the php call).
|
Thanks for testing!
I would have to imagine it's only the reporting that's getting effected here, not the ability to track what's going on. On the cookie note (totally un-related to the css tracking)...with FPI and extensions now being able to handle cookies in isolation, do you think it's worth considering allowing first-party cookies by default? Some fingerprinting test sites indicate blocking all cookies reveals a decent amount of info: Panopticlick:First-party cookies allowed:
All cookies blocked:
I recently switched to allowing first party cookies + FPI + CAD to delete non-white listed cookies on tab close...not sure if that was a wise move though haha |
Just glancing at the comments in gorhill's issues it doesn't sound like there can be much done about this either. I agree though, the information that could be gathered from this isn't that worrisome. Thanks for the insight on the cookies! It appears I severely underestimated the consequences of turning them back on haha. I didn't realize how tied into other storage it was (haven't done my due diligence in looking into local stroage/IDB yet). I've taken your advice, deleted the sqlite db, and blocked cookies again.
Perhaps we can re-visit this way way down the road then haha. Really do appreciate the help though! |
This method wouldn't be terribly informative though, would it be? The css approach only seems to tell you about the presence of a generic font family, nothing more specific. Or am I misunderstanding? |
Yes, it has only one entry called Calibri. |
Thanks! |
That sounds like more of a mess than I'm ready to try and sort out 😬 |
You're sending a hidden request when you click that link. (see the uMatrix logger) The link element becomes (the
|
Isn’t cookies here just for simplifying demo?
Server knows when you have clicked/howered/whatever, but has to bind it to session/user somehow.
In this case the cookie it is but instead of cookie there could be also somesort of url tracking parameter or other means of FPing.
IDK, just thinking out loud. ;)
|
this. |
^^That is what I meant. IMO: Since its just POC demo, the user ID is simplified over cookies. |
CSP is overridden here by pure browser's flaws. Most cases involve 3rd parties, but coredump link below says that it can happen on a 1st party site, via non-secure requests. The limits of exfiltration defenses, see 2.6. Addendum Following quote is from an article about Clickjacking, but talks about these CSS Injections:
Exploitation of other vulnerabilities via Framing It ends with three different approaches to defend against Clickjacking
Related: #319 (comment) |
Yeah, I mentioned this in sticky:extensions a few days ago, just now getting back to see the follow-up. Anyway, the more I looked into it I suspect that it isn't too great of a threat, not just yet, if ever. Most of the testing scenarios were tailor made, relying on specific and "one-in-a-million" type situations. However, it is there and it can be done, and possibly expanded upon in the future. Not basing that on anything specific other than the natural swing of things. No problem if you feel it should be removed from the sticky:extensions list until it becomes a more pressing threat. |
//github.com/mlgualtieri/CSS-Exfil-Protection/pulls |
Blocking 1st party images via uM works in this case |
^^Why didn't you say: not browsing the web works in this case 😄 |
Because blocking first party images from sites you don't trust or where they aren't needed is actually a reasonable, and arguably a worth while, approach to take. Take Reddit as another example. The only first party image it has is a tracking pixel: reddit.com/static/pixel.png |
I don't understand this tracking pixel. Is for everyone different color, or how the tracking works? |
Creative Manipulation of HSTS Policy Store Since an HSTS Host may select its own host name and subdomains thereof, and this information is cached in the HSTS Policy store of conforming UAs, it is possible for those who control one or more HSTS Hosts to encode information into domain names they control and cause such UAs to cache this information as a matter of course in the process of noting the HSTS Host. This information can be retrieved by other hosts through cleverly constructed and loaded web resources, causing the UA to send queries to (variations of) the encoded domain names. Such queries can reveal whether the UA had previously visited the original HSTS Host (and subdomains). Such a technique could potentially be abused as yet another form of "web tracking" [WebTracking]. See: #102 (comment) #363 |
ETags, probably. |
snip
The text was updated successfully, but these errors were encountered: