Author Topic: What to do against TLS Session Resumption & Session IDs?  (Read 1134 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast √úberevangelist
  • Probably Bot
  • *****
  • Posts: 33329
  • malware fighter
What to do against TLS Session Resumption & Session IDs?
« on: October 21, 2018, 12:33:03 PM »
TLS Session Resumption provides an ideal way to quirk privacy in the browser by big data slupers like facebook etc.

Problem especially with android browsers as sessions can stay open for quite some time.
So take your privacy delicate searches back to the old desktop browser,
with a browser you can close and cleanse ever so offten.

Some finds methods to disable this:
See how constant tracking and monitoring by Big Commerce & Big Guv
threatens the last vestiges of your privacy by scanning here:

My question what is the best way to make it a little bit harder for Big Slurper to abuse TLS in this way?
This while I know on the other hand, that this is an ongoing  cat and mouse game between the tracking and those being tracked,
(us) where trackers will always look for new ways to track even going so far as abusing a security protocol for their ends
as they do in this case of TLS Session Resumption and Session ID tracking.

Anyone with ideas?

polonus (volunteer 3rd party cold reconnaissance website security analyst and website error-hunter)

N.B. Also good to read:
                           and  (Hovav Schacham &Al.)

« Last Edit: October 21, 2018, 12:55:45 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline alanb

  • Poster
  • *
  • Posts: 586
Re: What to do against TLS Session Resumption & Session IDs?
« Reply #1 on: October 21, 2018, 02:51:52 PM »
If you are fortunate enough to be a Firefox user, in about:config simply set

'security.ssl.disable_session_identifiers'  to 'true:D