[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #28125 [Applications/Tor Browser]: Don't let Android leak DNS queries



#28125: Don't let Android leak DNS queries
------------------------------------------+------------------------
     Reporter:  sysrqb                    |      Owner:  tbb-team
         Type:  defect                    |     Status:  new
     Priority:  Very High                 |  Milestone:
    Component:  Applications/Tor Browser  |    Version:
     Severity:  Normal                    |   Keywords:  tbb-mobile
Actual Points:                            |  Parent ID:  #5709
       Points:                            |   Reviewer:
      Sponsor:                            |
------------------------------------------+------------------------
 In #27431 and #27375, it was reported Android is leaking DNS requests.
 From [ticket:27431#comment:1 27431], in summary:

 {{{
 This is exactly what we feared. It looks like this is the result
 of a bug within the Android core HTTP library. This leak is already
 fixed in the more recent releases of Android. In particular, any
 version after Android O (API 26+) should not leak DNS queries.
 }}}

 We should patch TBA so it relies on the Android core library as little as
 possible. We don't need the fancy optimizations Android provide with
 request pools and such, so I think we can simply create and manage a proxy
 connection ourselves.

 #27822 maybe related (but there isn't enough info available).

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28125>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs