[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #9623 [Tor Browser]: Referers being sent from hidden service websites



#9623: Referers being sent from hidden service websites
-------------------------+-------------------------------------------------
     Reporter:           |      Owner:  tbb-team
  cypherpunks            |     Status:  needs_revision
         Type:  defect   |  Milestone:
     Priority:  major    |    Version:
    Component:  Tor      |   Keywords:  tbb-torbutton, tbb-security,
  Browser                |  TorBrowserTeam201510R
   Resolution:           |  Parent ID:
Actual Points:           |    Sponsor:
       Points:           |
-------------------------+-------------------------------------------------
Changes (by gk):

 * status:  needs_review => needs_revision


Comment:

 Here are a couple of thoughts:

 1) I think all the general referrer related logic should not be included
 in this patch. Just the .onion related one (as this ticket is only about
 this and all the bikeshedding should go into #17228) and a pref, say
 `extensions.torbutton.disable_onion_referrer`, which governs
 enabling/disabling this feature

 2) This code is called quite often and thus we should try to make it a bit
 more efficient IMO. E.g. there is no need to do
 {{{
 var prefs = Components.classes["@mozilla.org/preferences-
 service;1"].getService(Components.interfaces.nsIPrefBranch);
 }}}
 every time `http-on-modify-request` gets triggered

 3) I wonder why we need the tor_enabled check. What is its purpose in this
 patch?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9623#comment:27>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs