[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #10839 [Firefox Patch Issues]: Block 127.0.0.0/8, RFC1918, and others ranges (for Non-Tor SOCKS proxies)



#10839: Block 127.0.0.0/8, RFC1918, and others ranges (for Non-Tor SOCKS proxies)
--------------------------------------+-----------------------
     Reporter:  cypherpunks           |      Owner:  mikeperry
         Type:  defect                |     Status:  new
     Priority:  normal                |  Milestone:
    Component:  Firefox Patch Issues  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+-----------------------

Comment (by cypherpunks):

 >The fix for #10419 was Tor specific.

 Tor specific is to block all localhost, RFC1918, and other non-routable
 addresses in first place, so Tor didn't warn user.

 >This is not a development priority for us
 #10419 not even fixes what it was should be fixed for all Tor specific
 cases. Proxying localhost can't fix fingerprint if used Tor specific
 transparent proxying.

 I can't get why you can't get this vuln. No even fix in result, just
 security hole in general Torbrowser implementation.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10839#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs