[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10839 [Firefox Patch Issues]: Block 127.0.0.0/8, RFC1918, and others ranges (for Non-Tor SOCKS proxies)
#10839: Block 127.0.0.0/8, RFC1918, and others ranges (for Non-Tor SOCKS proxies)
--------------------------------------+-----------------------
Reporter: cypherpunks | Owner: mikeperry
Type: defect | Status: new
Priority: normal | Milestone:
Component: Firefox Patch Issues | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+-----------------------
Comment (by cypherpunks):
>The fix for #10419 was Tor specific.
Tor specific is to block all localhost, RFC1918, and other non-routable
addresses in first place, so Tor didn't warn user.
>This is not a development priority for us
#10419 not even fixes what it was should be fixed for all Tor specific
cases. Proxying localhost can't fix fingerprint if used Tor specific
transparent proxying.
I can't get why you can't get this vuln. No even fix in result, just
security hole in general Torbrowser implementation.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10839#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs