[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #33962 [Applications/Tor Browser]: Uplift patch for 5741 (dns leak protection)
#33962: Uplift patch for 5741 (dns leak protection)
-------------------------------------------------+-------------------------
Reporter: acat | Owner: acat
Type: task | Status:
| accepted
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: ReleaseTrainMigration | Actual Points:
TorBrowserTeam202005R |
Parent ID: | Points:
Reviewer: | Sponsor:
| Sponsor58
-------------------------------------------------+-------------------------
Comment (by acat):
I created https://bugzilla.mozilla.org/show_bug.cgi?id=1636411, expecting
that it has good chances to be accepted and we can just flip
`networking.dns.disabled` to have the same protection as this patch. I
think the logic for proxy bypass protection when `networking.dns.disabled
= false` can be implemented later independently of that, but I assume that
will be not so easy to be accepted (or to get right).
But, unless I'm missing something, I don't think we really need to support
resolving DNS correctly if some user disables the SOCKS proxy and wants a
direct internet connection. That can only be done via `about:prefs`, so
that user would just need to edit one more pref to achieve that.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33962#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs