Hi, Uploaded. Please remove $HOME/.dooble before using 1.35. Please also verify that Settings->Security->Display... is disabled.
I tested 1.35 with respect to DNS queries alongside Wireshark (I removed DNS filters). The results were positive for both HTTP and FTP, that is, Wireshark didn't detect DNS packets. I then tested version 1.31 with respect to FTP and Wireshark discovered several DNS packets. (I did not test HTTP.) All of the tests were conducted using a socks5 proxy ( 190.120.14.210:1080). Thanks. On Thu, Aug 16, 2012 at 7:52 PM, Karsten N. <k...@awxcnx.de> wrote: > Hi, > > please post a download link for version 1.35 (Linux64) > I will test it again. > > On 08/16/2012 08:23 PM, Randolph D. wrote: > > there WAS in version dooble 1.31. QFP used, which leaked the Proxy for > DNS > > this problem has been solved: > > https://bugs.webkit.org/show_bug.cgi?id=50622 > > The bug is not solved, only moved to an other bugtracker: > > "I'm now moved it to an Apple internal bug tracker. Closing as INVALID > per our policy." > > > someone on this list tested and did not used version 1.35 and might have > > not disabled the option "show IP address on top of the window of the > > website". > > "show IP address on top of the window" was disabled for my test as > recommend by your early post. > > But the DNS leak affects all Webkit browser we tested last week. Google > Chrome (Version 21.0.1180.79) for Linux and Windows leaks DNS requests, > Rekong leaks DNS requests... If you were using Webkit without own > modifications I am sure, it will leak DNS requests too. > > The DNS leaks are independent of the FTP bug. > HTTP/HTTPS requests are affected too. > > Best regards > Karsten N. > _______________________________________________ > tor-talk mailing list > tor-talk@lists.torproject.org > https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk > _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk