[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #21863 [Applications/Tor Browser]: Ensure proxy safety on Android



#21863: Ensure proxy safety on Android
-------------------------------------------------+-------------------------
 Reporter:  gk                                   |          Owner:  sysrqb
     Type:  defect                               |         Status:
                                                 |  accepted
 Priority:  Very High                            |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  tbb-mobile, tbb-7.0-must, tbb-       |  Actual Points:
  proxy-bypass, TorBrowserTeam201807             |
Parent ID:  #26531                               |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor4
-------------------------------------------------+-------------------------

Comment (by toproxy):

 Tor browser for Android compiled from esr60.1 branch in
 [https://git.torproject.org/user/sysrqb/tor-browser.git sysrqb's Tor
 browser repository] is leaking domains of visited websites. Orfox has the
 same proxy config values as TBA but Orfox does not leak DNS. So I've
 decided to test Firefox 52 and found that Firefox 52 leaks DNS just like
 TBA based on esr60. Were not all Orfox patches added to TBA?


 It appears that this proxy-bypass happens after websites are completely
 loaded. And another thing to note is DNS requests for resources within
 websites are not leaked but that's not always the case.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21863#comment:29>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs