Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Impact on network traffic monitoring solutions #101

Closed
KenjiBaheux opened this issue Dec 10, 2021 · 10 comments
Closed

Impact on network traffic monitoring solutions #101

KenjiBaheux opened this issue Dec 10, 2021 · 10 comments

Comments

@KenjiBaheux
Copy link

What about other kinds of network traffic monitoring? (Imagine, for example, that a site links to illegal content, and the browser prerenders that - would it appear that the user has visited a page with illegal content if their network was being monitored?) from issue #90 by @rhiaro

@KenjiBaheux
Copy link
Author

Network traffic monitoring solutions will continue to have access to the same info. Enterprise/Edu admins will also have access to group policies that control all speculative features (at least this is the plan for Chrome; I haven’t checked the current stance in other browsers).

@KenjiBaheux
Copy link
Author

Let me close this issue for now. Please reopen if there are any follow-ups needed.

@rhiaro
Copy link

rhiaro commented Mar 25, 2022

Understood that networks with traffic monitoring will keep the same access for the purpose of enforcing network content policies.

My question was about how a prerendered page - one the user hasn't actually visited - could be used by a hostile actor (who is monitoring network traffic) to incriminate the user.

Particular examples could be: a work place looking to discredit an employee who is attempting to unionize workers; or a corrupt government authority set out to "find" evidence that would get the devices of an investigative journalist seized by law enforcement (where said law enforcement may not be well versed in what a prefetch header is).

I recognise there are existing ways to plant evidence of unwholesome web browsing activity - but that doesn't mean its okay to introduce functionality to the web platform that lowers the bar to doing so. I'm just hoping to flag less mainstream threat models that may affect particularly vulnerable people, to make sure they get adequate attention.

@buettner
Copy link

buettner commented Apr 6, 2022

Is the concern that the attacker (1) controls the referring website and (2) uses it to trigger prerenders to a "unwholesome" site for a user, and then (3) monitors the network for the requests to the "unwholesome" site?

Could they achieve the same thing just using normal fetches from the referring site?

@rhiaro
Copy link

rhiaro commented Apr 6, 2022

The concern is about the threat of (3), the attacker doesn't need control per (1).

@buettner
Copy link

buettner commented Apr 6, 2022

Sorry, I may not have been clear.

I am just wondering if prerendering adds capabilities in this scenario. Some entity is triggering the prerender of the "unwholesome" site to plant evidence, and the way they would trigger that prerender is by controlling a referring page.

I am trying to understand if they could just trigger a normal fetch from the referring page for the unwholesome site, which would look the same from the point of view of the network monitor.

@rhiaro
Copy link

rhiaro commented Apr 6, 2022

The prerender may have been triggered by a naive implementation by the referring site, or as a result of opaque UA heuristics for deciding what to prerender, not necessarily by a malicious referrer. As I said in my earlier comment:

I recognise there are existing ways to plant evidence of unwholesome web browsing activity - but that doesn't mean its okay to introduce functionality to the web platform that lowers the bar to doing so.

In general I'd be interested to know more about how network monitoring systems differentiate between a normal request triggered explicitly by the user in the UA, a prerendered that the UA has decided to do on behalf of a user, and a fetch request made by a site without the users knowledge. But the feature being introduced here is the prerendering speculation rules, so that is specifically what I'd like to make sure is considered with regards to this potential threat.

@KenjiBaheux
Copy link
Author

For the purpose of w3c tag review
As far as I understand the scenarios outlined here are not relevant to the scope of w3c tag review #667 since we are only discussing the same-origin case. The user is already on the site that may trigger prerendering but only for same-origin pages.

That said, we could discuss these scenarios to inform future cross-origin plans.
@rhiaro Do you mind if I file a separate issue and close this one?

@rhiaro
Copy link

rhiaro commented Apr 7, 2022

I think the threat may exist for same origin, but if you think it makes sense to file a separate issue that's fine, thanks @KenjiBaheux.

@KenjiBaheux
Copy link
Author

Let's discuss over issue #155.

For the same origin case, I don't see how this would work because the network monitoring services would typically not see the URL, just the hostname which it already saw when the user landed on the website that triggered the prerendering. Feel free to open a new issue with a specific same-origin scenario if I'm missing something.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants