On Sat, 24 Jan 2009 13:05:41 +0000, Matthew Toseland wrote:
> There have been some question marks over whether it is possible to
> load an image from an external domain and get a callback when it is
> loaded - if so, it may be possible to time fetches of specific sites
> from javascript on an unrelated site. Meaning running a web browser
> on a system with access to fproxy is dangerous. I haven't tested
> this, maybe you'd like to?

It's a well known attack--"cache timing attacks". Pretty similar to
css-history attacks. And it's also not hard to prevent. (For history
attacks, simply disable history in your freenet profile.) For cache
attacks, simply restrict access to fproxy to a separate freenet user on
your system. (And, of course, do not use that user to surf the
dangerous web--unless, of course, you use a safe browser, like one with
javascript disabled. Javascript is, after all, the root of all
(website) evil.)

Fproxy access can be restricted on a per-user basis very simply with
iptables:

iptables -A OUTPUT -p tcp --dport 8888 -m owner ! --uid-owner
$FREENETUID -j DROP

Reply via email to