[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5761 [TorBrowserButton]: Decide if it's safe to pass the Dooble around the Tor Community



#5761: Decide if it's safe to pass the Dooble around the Tor Community
---------------------------------+------------------------------------------
    Reporter:  mike123           |       Owner:  mike123 
        Type:  enhancement       |      Status:  reopened
    Priority:  normal            |   Milestone:          
   Component:  TorBrowserButton  |     Version:          
  Resolution:                    |    Keywords:          
      Parent:                    |      Points:          
Actualpoints:                    |  
---------------------------------+------------------------------------------

Comment(by gk):

 Replying to [comment:22 mike123]:

 > Can you describe how you have done your tests and what the results are
 and what you expected different? Which settings did you use, auto retrive
 proxy settings?
 I used JonDonym for testing, an anonymization network similar to Tor with
 similar goals in mind (https://anonymous-proxy-servers.net). But actually
 a simple proxy should do it here as well. I entered the proxy settings
 manually (HTTP 127.0.0.1:4001) in every proxy field I could find in the
 proxy panel as I wanted to test on http://ip-check.info. The latter tries
 circumventing the proxy settings actively using different techniques (e.g.
 FTP, hence I entered the proxy settings for FTP as well). While loading
 the test (ignore the output as the layout and presentation of the results
 do not work with Dooble yet) I looked at Wireshark and it gave me: 1) DNS
 leaks for ip-check.info and 2) the FTP traffic bypassed JonDonym. Thus,
 Dooble is not following the proxy settings. The reason is probably:

 https://anonymous-proxy-servers.net/blog/index.php?/archives/233-Chrome-
 and-Safari-leak-IP-address.html

 And yes, we filed a bug, ages ago:

 https://bugs.webkit.org/show_bug.cgi?id=50622

 But nobody seems to care about *shrug*. BTW: You may still see the problem
 (as it should be shown to Dooble users as well) visiting http://ip-
 check.info with e.g. the latest Chrome.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5761#comment:24>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs