In #4099 (closed) we disabled both TLS session resumption and session IDs due to tracking risks. We should bind them to the URL bar domain instead if that is possible.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
That made it into ESR52 it seems. Let's check whether it is working as we want when we transtition to ESR52 and let's think about enabling both again then.
SSL session tickets and session IDs would be very nice to re-enable now if we can, given that every TLS handshake takes two round trips, a big performance penalty when using the tor network.
Trac: Summary: Isolate TLS session resumption/ID to the URL bar domain to Confirm TLS session resumption/ID are isolated to the URL bar domain, and re-enable them Keywords: N/Adeleted, TorBrowserTeam201711, tbb-performance added
I just noticed that the pref "security.enable_tls_session_tickets" was removed from Firefox in 2013: https://bugzilla.mozilla.org/show_bug.cgi?id=917049. So we can definitely remove that pref from browser/app/profile/000-tor-browser.js.
Fortunately, the pref we uplifted in 2014, "security.ssl.disable_session_identifiers" is still present in Firefox, and is designed to disable both session IDs and session tickets. The question remains whether we should remove this pref as well.
Jonathan Hao at Mozilla implemented FPI (OriginAttribute isolation) of session identifiers and session tickets in https://hg.mozilla.org/mozilla-central/rev/9aba8184664d. That patch includes unit tests to show that isolation is effective when "privacy.firstparty.isolate" is enabled.
Therefore we can be confident that session tickets/identifiers are isolated by first party. So here's my patch for review (applied on top of my proposed #14952 (moved) patch):