[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #23249 [Applications/Tor Browser]: Tor Browser DNS security: hosts file bypassed when "Proxy DNS when using SOCKS v5" is enabled
#23249: Tor Browser DNS security: hosts file bypassed when "Proxy DNS when using
SOCKS v5" is enabled
--------------------------------------+---------------------------
Reporter: lux+tor@… | Owner: tbb-team
Type: defect | Status: closed
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Major | Resolution: not a bug
Keywords: | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
--------------------------------------+---------------------------
Comment (by cypherpunks):
@lux Your ticket was closed by the user {{{cypherpunks}}} who is an open
multi-user, it isn't used by Tor Project employees.
If you want this to be seen by Tor Project employees then I may reopen it
but I'm reluctant to since **that the hosts file should be bypassed is
expected behavior**. Otherwise it becomes easy to censor sites for the Tor
Browser, and since some users use hosts file to block ads (Peter's hosts
file for example) then they will become easier for fingerprint. Without
even mentioning what proxy bypasses and whatnot may result from such a
move.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23249#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs