-
Notifications
You must be signed in to change notification settings - Fork 689
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Purple Tor bar still showing in Tor #5052
Comments
Note that I'm unable to reproduce this on Ubuntu/TBB 9.0.1, so this may be a platform-specific issue. |
If it can help here's a few quick checks I made (all using Tor Browser 9.0.2): Dev VM(in a Ubuntu VM), as of 6c46568: Security setting: Safer and Safest (same behavior) Windows 10(in a VM) Ubuntu 18.04Summary:In Ubuntu, Dev environment, the "Security settings" warning is displayed at Standard level only. I don't have a Mac to test but from @ninavizz's screenshot, the "Recommended to use Tor Browser" warning is displayed even at Safest level. Additional note, I noticed the "warning icon" text in the banner when the "Security settings" warning is displayed, both in the Dev VM and on the ABC instance when using Ubuntu. The CBC instance (also 1.1.0) displays the icon properly: |
Repro'd on MacOS if browser settings are at Safe and Safer (but not Safest). |
See https://github.com/freedomofpress/securedrop/blob/2d066eb4dfe569973418ebe372c3f7f128e91d7c/securedrop/static/js/source.js |
It seems to me that the "Is this Tor or just Firefox" detection code is inherently fragile. There's a strong case for detecting browsers known to support Tor without its built-in security protections (e.g., Brave), but should we narrow the detection logic here to make it more maintainable? |
(relevant: #3793 and anywhere else this same checking logic is used) |
@rocodes will be doing some research doing the 12/5-12/18 sprint:
We can then discuss more as a team as needed. |
TB UAS Relevant Info
Relevant tickets
A bit about mobileThis section might not be as relevant because we aren't really mobile-optimized anyway, but it's good to know.
Detecting Tor now
What next
Levity |
really nice writeup, thanks!
hmm yeah that makes sense, do you know how clean selecting by just GMT timezone and window margins are zero is? (i.e. if we remove the UserAgent regex) |
That's what we do now (plus the regex), but I have yet to test if that is sufficient. The window margins were always a pretty good hint, but I haven't looked into if letterboxing changes that at all, or if those two indicators alone are sufficient. bit of testing is my next step. |
Of interest: For example, on security slider setting "Safer," my |
Updated opinion: I think I vote to stop trying to detect Tor browser and display a generic "we hope you're on Tor browser" message. Rationale: Firefox's If we continue to use UAS as a means of trying to identify Tor, we will have to keep that regex updated as Tor updates, which will lead to brief breakage every time the spoofed UAS is changed. Seems like too much fuss for this feature. For the short term I will put in a PR to update the regex, which will match updated versions of Tor browser on all platforms (with the above caveat of false positives on Firefox with Other opinions welcome/encouraged though. |
👍 to updating the regex for now. Another change (could be done separately) that would be nice is simplification of the regex to remove support for older version of Tor Browser, provided we modify the text slightly replacing "Tor Browser" with "latest Tor Browser" (and double checking that the instructions we link to in the banner are consistent with the update case). We don't actually want people to use old versions of Tor Browser either, so this seems like a win all around. Regarding a broader change, I would be amenable to a generic message “Ensure you are using the latest version of Tor Browser for your security” or similar. What do you think about a simple message like that @ninavizz? The hazard is that users might be confused - “but am I using Tor browser!” - but if we can find the right wording I think this could be an acceptable tradeoff. If finding acceptable language there is not possible, then I think we’ll want to preserve some kind of browser detection logic to handle the cases where sources might be using Tor but not Tor Browser. This will happen due to the increasing popularity of e.g. Brave Tor tabs or other browsers that enables access to onion services but do not yet have sufficient leak proofing for a sensitive use case like SecureDrop. See relevant discussion in Brave's community forum about the User-Agent - if they keep the UA Chromium-like and not Firefox-like then we will definitely be able to encourage Brave users to get regular Tor Browser until their tabs are at parity in terms of leakproofing protection with Tor Browser, so that's good news. If we do continue to preserve the browser detection, regarding the breakage in production:
|
Under what circumstances would that generic message be shown? Always, or only if there is some mismatch? If always, I worry a little bit about message fatigue here. How about eliminating attempts to detect Tor Browser itself, and focusing only on detecting known methods for accessing .onion services which we do not currently recommend (e.g., Brave, Orfox [already implemented]) and which we can detect with sufficient reliability? |
Description
I am being told to use Tor when I am using Tor.
Steps to Reproduce
Lookup instance using Tor, on a Mac.
Expected Behavior
No purple bar.
Actual Behavior
Purple bar.
Comments
Not sure if an issue already exists for this, but I do recall chatting w/ @rmol and @zenmonkeykstop about it.
Suggestions to fix, any other relevant information
This will really suck for sources. I'd rather not do the purple bar or any "You are not using Tor" kind of dictatorial intercept, if we cannot get it right. A lighter "Hey, are you using Tor?" y/n binary question or an interstitial, could be a better option.
The text was updated successfully, but these errors were encountered: