[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #23439 [Applications/Tor Browser]: Exempt .onion domains from mixed content warnings
#23439: Exempt .onion domains from mixed content warnings
-------------------------------------------------+-------------------------
Reporter: gk | Owner: gk
Type: defect | Status:
| needs_review
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: TorBrowserTeam201803R, | Actual Points:
GeorgKoppen201803 |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by mcs):
Replying to [comment:18 arthuredelstein]:
> As a version of these patches have landed in Mozilla, shall we backport
them to include in the next Tor Browser alpha?
I thought of doing this a couple of weeks ago, but I got stuck because the
automated test fails for a strange reason, at least in my non-rbm macOS
build. What happens is that an SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED
error occurs while trying to load
https://example.com/browser/browser/base/content/test/siteIdentity/test_no_mcb_for_onions.html
Manually testing does show that the patch is correct. The main advantage
over the patches from comment:15 is that pref caching is included. You can
find the two commits here:
https://gitweb.torproject.org/user/brade/tor-
browser.git/log/?h=bug23439-01
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23439#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs