Mozilla Asks U.S. Court to Disclose to it First Any Vulnerabilities in Tor

by Ostatic Staff - May. 12, 2016

There continue to be many people around the globe who want to be able to use the web and messaging systems anonymously, despite the fact that some people want to end Internet anonymity altogether. Typically, the anonymous crowd turns to common tools that can keep their tracks private, and one of the most common tools of all is Tor, an open source tool used all around the world.

Project leaders behind Tor have continuously improved its security features, but now Mozilla is asking the U.S. District Court for the Western District of Washington, in the interest of Firefox users, to disclose any findings of vulnerability in Tor to it first, before any other party learns of the vulnerability. Here is the thought behind this.

Denelle Dixon-Thayer, chief legal and business officer at Mozilla, wrote in a blog post:

"User security is paramount. Vulnerabilities can weaken security and ultimately harm users. We want people who identify security vulnerabilities in our products to disclose them to us so we can fix them as soon as possible."

"Today, we filed a brief in an ongoing criminal case asking the court to ensure that, if our code is implicated in a security vulnerability, that the government must disclose the vulnerability to us before it is disclosed to any other party. We aren’t taking sides in the case, but we are on the side of the hundreds of millions of users who could benefit from timely disclosure."

"The relevant issue in this case relates to a vulnerability allegedly exploited by the government in the Tor Browser. The Tor Browser is partially based on our Firefox browser code. Some have speculated, including members of the defense team, that the vulnerability might exist in the portion of the Firefox browser code relied on by the Tor Browser. At this point, no one (including us) outside the government knows what vulnerability was exploited and whether it resides in any of our code base. The judge in this case ordered the government to disclose the vulnerability to the defense team but not to any of the entities that could actually fix the vulnerability. We don’t believe that this makes sense because it doesn’t allow the vulnerability to be fixed before it is more widely disclosed."

  Mozilla makes an important point here. A lot of people forget that open source code bases get replicated across different tools. For example, the Chrome browser is based on Chromium code, and Chrome OS is based on Linux code. Clearly, Mozilla is mindful of the fact that Firefox and Tor share code, so the request to hear first about any discovered vulnerability sounds reasonable.

"Court ordered disclosure of vulnerabilities should follow the best practice of advance disclosure that is standard in the security research community," stresses Mozilla. "In this instance, the judge should require the government to disclose the vulnerability to the affected technology companies first, so it can be patched quickly."