[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #28125 [Applications/Tor Browser]: Don't let Android leak DNS queries
#28125: Don't let Android leak DNS queries
------------------------------------------+------------------------
Reporter: sysrqb | Owner: tbb-team
Type: defect | Status: new
Priority: Very High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Keywords: tbb-mobile
Actual Points: | Parent ID: #5709
Points: | Reviewer:
Sponsor: |
------------------------------------------+------------------------
In #27431 and #27375, it was reported Android is leaking DNS requests.
From [ticket:27431#comment:1 27431], in summary:
{{{
This is exactly what we feared. It looks like this is the result
of a bug within the Android core HTTP library. This leak is already
fixed in the more recent releases of Android. In particular, any
version after Android O (API 26+) should not leak DNS queries.
}}}
We should patch TBA so it relies on the Android core library as little as
possible. We don't need the fancy optimizations Android provide with
request pools and such, so I think we can simply create and manage a proxy
connection ourselves.
#27822 maybe related (but there isn't enough info available).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28125>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs