[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #11055 [Firefox Patch Issues]: Investigate potential DNS leak on Windows when using SSPI
#11055: Investigate potential DNS leak on Windows when using SSPI
--------------------------------------+-----------------------
Reporter: gk | Owner: mikeperry
Type: task | Status: new
Priority: normal | Milestone:
Component: Firefox Patch Issues | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+-----------------------
Changes (by gk):
* priority: major => normal
Comment:
Some days ago on #necko:
Q: Well, the code on https://mxr.mozilla.org/mozilla-
esr24/source/extensions/auth/nsAuthSSPI.cpp#122 seems to bypass proxy
settings. Is that correct?
A: SOCKS is supposed to do that, yes.
Q: But what if I have remote DNS resolution configured?
A: Different code.
Q: What do you mean?
So, on the Mozilla side they are not worried which may mean (which is very
likely) I overlooked something while looking at it superficially. Anyway,
might still be worth investigating although with a lower priority as our
current patches block all direct DNS requests if a proxy and remote DNS
resolution is configured.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11055#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs