A check for cookie respawning using Verizon's UIDH. Included in the repo is the code required to both run crawls and analyze the resulting databases. You can also find download links below for the databases I collected.
For my thoughts on the header, read my Freedom to Tinker post.
- OpenWPM-0.2.1/ - modified OpenWPM v0.2.1
- list_domains.py - lists the domains where turn.com's respawned IDs are found
- respawning.py - checks for cookies that may be respawned from the XUID header
The included OpenWPM code is largely similar to the public repository. I've simply added line 72 to automation/Proxy/MITMProxy.py
, which inserts the UIDH header into all traffic. You can limit it to HTTP traffic by checking the http type of msg.request
first.
I ran a few crawls in parallel on EC2 on two different days. I used three different machines, but was sure to clear state between each crawl. You can find the data here.The name of the sqlite database indicates the configuration of the machine.
- 'u': UIDH string (string 1 or string 2)
- 'd': day the crawl took place on (day 1 or day 2)
- 'm': the machine the crawl was run on (machine 1, 2, or 3).