Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser
Commits:
- 
90df17da
by Richard Pospesel at 2023-02-15T13:37:32+00:00
- 
a697a2c0
by Richard Pospesel at 2023-02-15T13:38:06+00:00
2 changed files:
Changes:
| ... | ... | @@ -38,9 +38,6 @@ pref("dom.securecontext.allowlist_onions", true); | 
| 38 | 38 |  // Disable HTTPS-Only mode for .onion domains (tor-browser#19850)
 | 
| 39 | 39 |  pref("dom.security.https_only_mode.upgrade_onion", false);
 | 
| 40 | 40 | |
| 41 | -// tor-browser#22320: Hide referer when comming from a .onion address
 | |
| 42 | -pref("network.http.referer.hideOnionSource", true);
 | |
| 43 | - | |
| 44 | 41 |  // Bug 40423/41137: Disable http/3
 | 
| 45 | 42 |  // We should re-enable it as soon as Tor gets UDP support
 | 
| 46 | 43 |  pref("network.http.http3.enabled", false);
 | 
| ... | ... | @@ -68,6 +68,12 @@ pref("browser.pagethumbnails.capturing_disabled", true); | 
| 68 | 68 |  pref("dom.security.https_only_mode", true);
 | 
| 69 | 69 |  pref("dom.security.https_only_mode_pbm", true);
 | 
| 70 | 70 | |
| 71 | +// tor-browser#22320: Hide referer when comming from a .onion address
 | |
| 72 | +// We enable this here (rather than in Tor Browser) in case users of other
 | |
| 73 | +// base-browser derived browsers configure it to use a system Tor daemon
 | |
| 74 | +// to visit onion services.
 | |
| 75 | +pref("network.http.referer.hideOnionSource", true);
 | |
| 76 | + | |
| 71 | 77 |  // Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
 | 
| 72 | 78 |  // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
 | 
| 73 | 79 |  // MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
 |