#33962: Uplift patch for 5741 (dns leak protection)
-------------------------------------------------+-------------------------
 Reporter:  acat                                 |          Owner:  tbb-
                                                 |  team
     Type:  task                                 |         Status:
                                                 |  needs_review
 Priority:  Medium                               |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  ReleaseTrainMigration                |  Actual Points:
  TorBrowserTeam202005R                          |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor58
-------------------------------------------------+-------------------------

Comment (by gk):

 Replying to [comment:2 acat]:
 > I adapted the patch from #5741 to try to upstream it. You can find it in
 https://github.com/acatarineu/tor-browser/commit/33962
 (f27d3258eb3ca2a86774342248184c8111546dab).
 >
 > I know we briefly discussed about having this behind the `--enable-
 proxy-bypass-protection`, but I think there *might* be chances for this to
 be upstreamed as it is now, and be useful for Firefox (it wouldn't be for
 sure if it's behind the proxy bypass flag).
 >
 > I did a couple of changes with respect to the original patch. The main
 one is that the patch I attached is checking that both `network.proxy.type
 = MANUAL` and `network.proxy.socks_remote_dns = true`, while the current
 patch only checks `network.proxy.socks_remote_dns = true`. I think this
 change is needed to avoid blocking DNS when we should not, for example in
 a situation where a user sets up a SOCKS proxy (enabling DNS through
 socks), and then switches back to 'No proxy', in `about:preferences`. I
 think the patch with these changes is safe enough for Firefox, in the
 sense that it should not result in undesired breakage.
 >
 > The question is whether is also safe for us, in terms of proxy bypass
 protection. My assumption is yes, as the only additional change is that we
 also check for `network.proxy.type`, and we don't support changing this in
 Tor Browser. But I think it's a good idea for this to be reviewed before
 trying to push the patch to Firefox. I added this to 202005, but please
 feel free to re-prioritize.

 Hrm. I wonder if it would be smarter to open a bug at bugzilla in the mean
 time (I don't see one filed as child of
 https://bugzilla.mozilla.org/show_bug.cgi?id=1433504) and get feedback
 about what would be acceptable for Mozilla and then write a patch that
 would fix this bug, too). I mean we could go through the review process
 here and maybe merge your patch to our tree just to write yet another
 patch which Mozilla would accept. I have some hope, though, we can avoid
 the first part and save us some time. :) What do you think?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33962#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to