On Saturday 16 October 2010 10:37:28 Florent Daigniere wrote:
> On Fri, Oct 15, 2010 at 09:35:45PM -0400, Gregory Maxwell wrote:
> > On Fri, Oct 15, 2010 at 9:22 PM, David ?Bombe? Roden
> > <bombe at pterodactylus.net> wrote:
> > > On Friday 15 October 2010 22:01:55 Gregory Maxwell wrote:
> > >
> > >> JS can be used for a lot of really really nasty tracking and anonymity
> > >> busting.
> > >
> > > So, you trust our Java code but not our JavaScript code?
> > >
> > > I disregard the rest of your mail because I get the distinct feeling that 
> > > you
> > > are not separating between the ?the Freenet web interface? and ?arbitrary
> > > freesites random people insert.?
> > 
> > That is unfortunate, because we've had a simple and easily corrected
> > communication error.  One which might have been corrected without any
> > intervention on my part had you simply taken a moment more to read the
> > rest of my message, but I apologize for being unclear.
> > 
> > I'm not saying much about the trustworthiness of the freenet code.
> > 
> > A browser which has javascript enabled is potentially subject to
> > executing malicious code from third parties.
> 
> Which part of "you shouldn't use the same browser for browsing freenet
>  and the web" did you not undestand?

Most users will use the rabbit icon to browse Freenet. That launches a browser 
in privacy/incognito mode. Unfortunately that is not entirely reliable, so we 
still have to warn the user.
> 
> > The question of this risk
> > existing via freenet is _mostly_ a question of fproxy successfully
> > detecting and blocking any of the multitude of ways of tricking a
> > browser into executing code on the page. Or, in other words, the
> > _browser_ cannot distinguish between the freenet web interface and
> > arbitrary freesites and so unless fproxy does a heroic job of removing
> > everything the browser might possibly execute then javascript poses a
> > significant risk.
> > 
> 
> Fproxy does that and has done it since forever. We have now a significant
>  amount of whitelist filters, filtering along with other protocols both
>  CSS and HTML. Feel free to try the filter out and report bugs you find.
> 
> It has been like that since... forever. We never relied on the user disabling
> javascript in his browser.

Simply because you don't need javascript to compromise a user's anonymity! You 
can do it with plain HTML!
> 
> > The wild continued success of XSS indicates that this is a very hard
> > problem? browsers try very hard to make "everything work", but that
> > means that making things not work is tricky.
> > 
> 
> XSS is about abusing the trust the browser has in the website it visits.
> Whether we use javascript or not for the interface is irrevelant.
> 
> > Also? I used the word mostly above because some JS driven attacks
> > wouldn't pass through fproxy. E.g. a non-freenet site could use the JS
> > CSS link-coloration information leak to learn about your use of
> > freenet if you browser that site with the same browser you use to
> > access freenet and have JS enabled.
> 
> No, you don't need javascript to conduct that attack. Anyway, that's one of
> the reasons why you should use a different browser for surfing the web and 
> freenet.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: This is a digitally signed message part.
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20101016/d284ebcb/attachment.pgp>

Reply via email to