Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security/privacy considerations around did:onion #163

Open
clehner opened this issue Apr 1, 2021 · 1 comment
Open

Security/privacy considerations around did:onion #163

clehner opened this issue Apr 1, 2021 · 1 comment

Comments

@clehner
Copy link
Contributor

clehner commented Apr 1, 2021

As mentioned in #147:

Security considerations around use in browsers: should some safety be placed around this resolver in WASM usage? In non-WASM, the default is to use proxy 127.0.0.1:9050, but in the browser there is no such assumption - we just fire off a Fetch reqwest.

@clehner clehner mentioned this issue Apr 1, 2021
3 tasks
@sbihel
Copy link
Member

sbihel commented Sep 9, 2021

My understanding from the Fetch specs is that it's forbidden to set a proxy at the request level -- it's only possible to set it in the browser settings.

These are forbidden so the user agent remains in full control over them.

I'm not sure what we can do about it -- maybe make a dummy request and have a look at the proxy headers in the response (if that's even set)? Or just put a note in the docs.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants