Currently, when browsing on a hidden service website, when you click on a clearnet/hidden service link it sends the current address as referer.
I think Tor Browser should behave for websites on .onion addresses the same as https:// websites on clearnet in certain cases.
Normally, when you click on a http link from a https website, it doesn't send any referer.
Tor Browser should at least use this same behavior of https for http hidden services (both are encrypted right?). No referers should be sent to clearnet or to other hidden services, this is unacceptable. I believe it shouldn't send referers for https links as well, so send nothing at all.
Other than a partial solution, I still believe using the smart referer is a better solution overall.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
This is not only an issue about users being tracked.
It's also bad for owners of hidden services as the addresses are getting discovered. Maybe the user was on a private website which nobody should learn, or at least on a private webpage on a public website.
Or maybe the referer could include login credentials, or other dangerous information.
The current behavior doesn't really fit well with the "hidden service" idea.
Here is my idea. By default, if it's a hidden service website in the referer, don't send it to any other domain.
But what about a preference to enable smart referer feature for all websites. It would make sense to integrate/combine this feature into #9387 (moved). In short, it would be a good idea to simplify this slider to choose between "usability" or "security" by adding any other missing preferences like this referer spoofing.
Mike, would you accept a torbutton patch that clears referer when going from a THS domain to any other domain? This is causing major headaches for us in SecureDrop.
Consider that the reasoning not to deprecate Referer behavior only makes sense when interacting with legacy clearnet websites. Providers of onion services should learn not to rely on cross-domain referrer trickery. Every day some onion addresses are being leaked to my web servers just because they link me… that is a serious issue!
Looks like setting about:config's network.http.referer.XOriginPolicy;1 may solve this problem without any further action needed, maybe the torbrowser dev team can look into that.
This is being actively exploited in the wild to discover Tor Hidden Services by sniffers on or around bad exits. Please ensure that TBB at least refuses to send referrers over plaintext communications channels (eg: port 80).
I can also imagine that even in the absence of malicious exits, somebody doing xkeyscore style rules on internet backbone traffic would scoop up all onion addresses whose web content links to pages on the insecure web. Sounds worth fixing.
Note that Firefox 36 implemented meta-referrer, so in the meantime, .onion site owners can simply add a HTML meta tag to clear all referrers on the document. https://bugzilla.mozilla.org/show_bug.cgi?id=704320
Looks like setting about:config's network.http.referer.XOriginPolicy;1 may solve this problem without any further action needed, maybe the torbrowser dev team can look into that.
I think that would affect all origins, not just .onion origins, which is probably not what we want. I usually browse with referrer disabled and I find that it occasionally breaks things.