[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #23249 [Applications/Tor Browser]: Tor Browser DNS security: hosts file bypassed when "Proxy DNS when using SOCKS v5" is enabled
#23249: Tor Browser DNS security: hosts file bypassed when "Proxy DNS when using
SOCKS v5" is enabled
--------------------------------------+---------------------------
Reporter: lux+tor@… | Owner: tbb-team
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution: not a bug
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+---------------------------
Changes (by boklm):
* status: reopened => closed
* resolution: => not a bug
Comment:
The hosts file on a system can contain many entries, including some that
could cause Tor Browser to do unexpected things, or do not make any sense
in the context of using Tor Browser.
One of the main properties in the Tor Browser design is "State
Separation":
https://www.torproject.org/projects/torbrowser/design/#security
The browser MUST NOT provide the content window with any state from any
other browsers or any non-Tor browsing modes. This includes shared state
from independent plugins, and shared state from operating system
implementations of TLS and other support libraries.
Using the hosts files to resolve host names would be against that
property.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23249#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs