#28125: Don't let Android leak DNS queries -------------------------------------------------+------------------------- Reporter: sysrqb | Owner: tbb- | team Type: defect | Status: | needs_review Priority: Immediate | Milestone: Component: Applications/Tor Browser | Version: Severity: Normal | Resolution: Keywords: tbb-mobile, tbb-proxy-bypass, | Actual Points: TorBrowserTeam201810R | Parent ID: #5709 | Points: Reviewer: | Sponsor: -------------------------------------------------+-------------------------
Comment (by igt0): For all my tests I have been using a real device connected to my computer and I am using mitmproxy(https://mitmproxy.org/) to debug http(s) protocol and wireshark for non tls stuff. **mobile/android/geckoview/src/thirdparty/java/com/google/android/exoplayer2/upstream/DefaultHttpDataSource.java** Steps: 1. Open https://bitmovin-a.akamaihd.net/content/MI201109210084_1/m3u8s /f08e80da-bf1d-4e3d-8899-f0f6155f6efa.m3u8 or https://content.jwplatform.com/manifests/yp34SRmf.m3u8 2. Look for connections to both URLs. Result: I was not able to verify any connection open for those URLs. **mobile/android/base/java/org/mozilla/gecko/updater/UpdateService.java** Test cases: 1. Enabled MOZ_UPDATER 2. Click in the check for updates button 3. Verify if any connection was made to the update URL Result: No request was made **mobile/android/base/java/org/mozilla/gecko/CrashReporter.java** Not able to test. **mobile/android/geckoview/src/main/java/org/mozilla/gecko/media/GeckoMediaDrmBridgeV21.java** It is disabled in our prefs and we don't plan to enable soon. So I didn't test it. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28125#comment:10> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs