Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser

Commits:

2 changed files:

Changes:

  • browser/app/profile/000-tor-browser.js
    ... ... @@ -38,9 +38,6 @@ pref("dom.securecontext.allowlist_onions", true);
    38 38
     // Disable HTTPS-Only mode for .onion domains (tor-browser#19850)
    
    39 39
     pref("dom.security.https_only_mode.upgrade_onion", false);
    
    40 40
     
    
    41
    -// tor-browser#22320: Hide referer when comming from a .onion address
    
    42
    -pref("network.http.referer.hideOnionSource", true);
    
    43
    -
    
    44 41
     // Bug 40423/41137: Disable http/3
    
    45 42
     // We should re-enable it as soon as Tor gets UDP support
    
    46 43
     pref("network.http.http3.enabled", false);
    

  • browser/app/profile/001-base-profile.js
    ... ... @@ -68,6 +68,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
    68 68
     pref("dom.security.https_only_mode", true);
    
    69 69
     pref("dom.security.https_only_mode_pbm", true);
    
    70 70
     
    
    71
    +// tor-browser#22320: Hide referer when comming from a .onion address
    
    72
    +// We enable this here (rather than in Tor Browser) in case users of other
    
    73
    +// base-browser derived browsers configure it to use a system Tor daemon
    
    74
    +// to visit onion services.
    
    75
    +pref("network.http.referer.hideOnionSource", true);
    
    76
    +
    
    71 77
     // Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
    
    72 78
     // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
    
    73 79
     // MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations