One of these days it might be nice to add a "New Identity" button to Torbutton to instruct vidalia or
the control port itself to choose a new path, in addition to clearing Tor cache+cookies. This
may or may not depend on a "Tor Status" check to verify that the tor process is in fact running.
Unfortunately, there are lots of usability issues with control port auth, multiple confusing controls
and statues, exactly which cookies get cleared, etc that need to be considered.
[Automatically added by flyspray2trac: Operating System: All]
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
a)what if vidalia has already authenticated to tor. I think doing it through vidalia might be a easier solution :). and listen on a local port for vidalia to connect back and report tor status.
b) IMHO just restarting the browser ("destroy old identity") would be ok - once and for all. haha.
It might also be a good idea to put the New Identity button on a timer a-la BetterPrivacy, to address the accumulation
of browsing state for long-lived tor-sessions.
Bug #1579 (closed) is a dup of this bug. Providing "New Identity" on a timer would give people a way to be safer from cookie and cache identifiers if they use Tor continuously, but would still like to have cookies and cache enabled. This would especially be handy if we could protect certain cookies from deletion from the timer, a-la #637 (closed).
Trac: Parent: N/AtoN/A Description: One of these days it might be nice to add a "New Identity" button to Torbutton to instruct vidalia or
the control port itself to choose a new path, in addition to clearing Tor cache+cookies. This
may or may not depend on a "Tor Status" check to verify that the tor process is in fact running.
Unfortunately, there are lots of usability issues with control port auth, multiple confusing controls
and statues, exactly which cookies get cleared, etc that need to be considered.
[Automatically added by flyspray2trac: Operating System: All]
to
One of these days it might be nice to add a "New Identity" button to Torbutton to instruct vidalia or
the control port itself to choose a new path, in addition to clearing Tor cache+cookies. This
may or may not depend on a "Tor Status" check to verify that the tor process is in fact running.
Unfortunately, there are lots of usability issues with control port auth, multiple confusing controls
and statues, exactly which cookies get cleared, etc that need to be considered.
[Automatically added by flyspray2trac: Operating System: All] Keywords: N/Adeleted, N/Aadded
Explicitly providing the option to close old tabs when this timer goes off is a good idea too, as lots of state can be hidden in a live open page, independent of cookies and cache.
Claims to defeat evercookies. We also defeat evercookies based on both my understanding of how they work and a manual test, but this addon is probably worth a quick look just to see if they do anything extra.
For Tor Browser Bundle, doing a New Identity Button is actually much easier, because Vidalia now launches both Tor and Firefox. It passes a control port password to Tor via the command line. It can pass this same password to Torbutton via an environment variable. This way, Torbutton can connect to Tor's control port to send the SIGNAL NEWNYM itself.
For Tor Browser Bundle, doing a New Identity Button is actually much easier, because Vidalia now launches both Tor and Firefox. It passes a control port password to Tor via the command line. It can pass this same password to Torbutton via an environment variable. This way, Torbutton can connect to Tor's control port to send the SIGNAL NEWNYM itself.
What level of Firefox (or extension) vulnerability would be sufficient to break into and reconfigure your Tor, in this case?
For Tor Browser Bundle, doing a New Identity Button is actually much easier, because Vidalia now launches both Tor and Firefox. It passes a control port password to Tor via the command line. It can pass this same password to Torbutton via an environment variable. This way, Torbutton can connect to Tor's control port to send the SIGNAL NEWNYM itself.
What level of Firefox (or extension) vulnerability would be sufficient to break into and reconfigure your Tor, in this case?
A vulnerability that enables the full reconfiguration of Tor from Firefox using this password would also allow arbitrary code execution as the Firefox user.
One of the reasons why this ticket is languishing for so long is that it is hard to envision the user story for a browser that auto-clears state without telling them. They are going to wonder why their logins keep breaking..
Is a periodic popup too much for this? How do we prevent it from getting annoying, without having them forget that the browser is doing this for them?
For Tor Browser Bundle, doing a New Identity Button is actually much easier, because Vidalia now launches both Tor and Firefox. It passes a control port password to Tor via the command line. It can pass this same password to Torbutton via an environment variable.
The firefox-remote IPC mechanism would most likely be a safer way to send the password to Firefox.
Hopkey: No one is actively working on it, but a quick hackish way to get it done is to invoke the functions invovled in the toggle codepath without actually toggling proxy settings: https://www.torproject.org/torbutton/en/design/#id2696524
I would accept such a patch if you were interested in working on it.
Hopkey: There may be some details with respect to either closing all open tabs, and/or giving them a separate and distinct tab tag, though. Search the design doc for "State Isolation" and "Network Isolation" to see how that comes into play..
Trac: Cc: mikeperry,squires,arma to mikeperry, squires, arma, Hopkey
This might be a lot easier to implement if proposal 171 gets implemented. Getting a new identity would be a matter of generating a new random SOCKS username.
This might be a lot easier to implement if proposal 171 gets implemented. Getting a new identity would be a matter of generating a new random SOCKS username.
Lunar: This ticket includes the Torbutton work of clearing all accumulated browser state.
Alright this is finished. Here is the list of things done:
Tag all tabs as non-tor
Disables Javascript and plugins on all tabs
Clears state:
a. OCSP
b. Cache
c. Site-specific zoom
d. Cookies+DOM Storage+safe browsing key
e. google wifi geolocation token
f. http auth
g. SSL Session IDs
h. last open location url
Sends tor the NEWNYM signal to get a new circuit
We still need to do a little better job SSL state, in particular intermediate certificates are not yet properly cleared. See #2739 (moved) for that.
Trac: Status: assigned to closed Actualpoints: N/Ato 8 Resolution: None to fixed