#33962: Uplift patch for 5741 (dns leak protection)
-------------------------------------------------+-------------------------
 Reporter:  acat                                 |          Owner:  acat
     Type:  task                                 |         Status:
                                                 |  accepted
 Priority:  Medium                               |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Normal                               |     Resolution:
 Keywords:  ReleaseTrainMigration                |  Actual Points:
  TorBrowserTeam202005R                          |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
                                                 |  Sponsor58
-------------------------------------------------+-------------------------

Comment (by acat):

 I created https://bugzilla.mozilla.org/show_bug.cgi?id=1636411, expecting
 that it has good chances to be accepted and we can just flip
 `networking.dns.disabled` to  have the same protection as this patch. I
 think the logic for proxy bypass protection when `networking.dns.disabled
 = false` can be implemented later independently of that, but I assume that
 will be not so easy to be accepted (or to get right).

 But, unless I'm missing something, I don't think we really need to support
 resolving DNS correctly if some user disables the SOCKS proxy and wants a
 direct internet connection. That can only be done via `about:prefs`, so
 that user would just need to edit one more pref to achieve that.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33962#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs

Reply via email to