Richard Pospesel pushed to branch base-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser
Commits:
93de138c by Pier Angelo Vendrame at 2023-02-15T15:24:47+00:00
fixup! Bug 31740: Remove some unnecessary RemoteSettings instances
Bug 41628: Disable Nimbus and Normandy components at compile time
(cherry picked from commit 34ed82f6c02a8dc5ed8390fa664e2f63aeadc303)
- - - - -
1 changed file:
- toolkit/components/moz.build
Changes:
=====================================
toolkit/components/moz.build
=====================================
@@ -122,10 +122,9 @@ if CONFIG["MOZ_WIDGET_TOOLKIT"] != "android":
"components.conf",
]
+# tor-browser#41628: Disable Normandy and Nimbus at compile time
if CONFIG["MOZ_BUILD_APP"] == "browser":
- DIRS += ["normandy", "messaging-system"]
-
-DIRS += ["nimbus"]
+ DIRS += ["messaging-system"]
if CONFIG["MOZ_BACKGROUNDTASKS"]:
DIRS += ["backgroundtasks"]
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/93de138…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/93de138…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser
Commits:
34ed82f6 by Pier Angelo Vendrame at 2023-02-15T15:23:42+00:00
fixup! Bug 31740: Remove some unnecessary RemoteSettings instances
Bug 41628: Disable Nimbus and Normandy components at compile time
- - - - -
1 changed file:
- toolkit/components/moz.build
Changes:
=====================================
toolkit/components/moz.build
=====================================
@@ -123,10 +123,9 @@ if CONFIG["MOZ_WIDGET_TOOLKIT"] != "android":
"components.conf",
]
+# tor-browser#41628: Disable Normandy and Nimbus at compile time
if CONFIG["MOZ_BUILD_APP"] == "browser":
- DIRS += ["normandy", "messaging-system"]
-
-DIRS += ["nimbus"]
+ DIRS += ["messaging-system"]
if CONFIG["MOZ_BACKGROUNDTASKS"]:
DIRS += ["backgroundtasks"]
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/34ed82f…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/34ed82f…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser
Commits:
9d3722cd by Richard Pospesel at 2023-02-15T13:55:19+00:00
fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
(cherry picked from commit a697a2c0dfb46591f6d497ae7178be3a55d55fc7)
- - - - -
1 changed file:
- browser/app/profile/000-tor-browser.js
Changes:
=====================================
browser/app/profile/000-tor-browser.js
=====================================
@@ -38,9 +38,6 @@ pref("dom.securecontext.allowlist_onions", true);
// Disable HTTPS-Only mode for .onion domains (tor-browser#19850)
pref("dom.security.https_only_mode.upgrade_onion", false);
-// tor-browser#22320: Hide referer when comming from a .onion address
-pref("network.http.referer.hideOnionSource", true);
-
// Bug 40423/41137: Disable http/3
// We should re-enable it as soon as Tor gets UDP support
pref("network.http.http3.enabled", false);
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9d3722c…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/9d3722c…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser
Commits:
8d7cac06 by Richard Pospesel at 2023-02-15T13:54:59+00:00
fixup! Firefox preference overrides.
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
(cherry picked from commit 90df17dac724c43bbc533a0f449a72ba419d9d67)
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -57,6 +57,12 @@ pref("media.memory_cache_max_size", 16384);
pref("dom.security.https_only_mode", true);
pref("dom.security.https_only_mode_pbm", true);
+// tor-browser#22320: Hide referer when comming from a .onion address
+// We enable this here (rather than in Tor Browser) in case users of other
+// base-browser derived browsers configure it to use a system Tor daemon
+// to visit onion services.
+pref("network.http.referer.hideOnionSource", true);
+
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
// Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
// MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8d7cac0…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/8d7cac0…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch base-browser-102.8.0esr-12.0-1 at The Tor Project / Applications / Tor Browser
Commits:
02bb195d by Richard Pospesel at 2023-02-15T13:54:39+00:00
fixup! Firefox preference overrides.
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
(cherry picked from commit 90df17dac724c43bbc533a0f449a72ba419d9d67)
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -57,6 +57,12 @@ pref("media.memory_cache_max_size", 16384);
pref("dom.security.https_only_mode", true);
pref("dom.security.https_only_mode_pbm", true);
+// tor-browser#22320: Hide referer when comming from a .onion address
+// We enable this here (rather than in Tor Browser) in case users of other
+// base-browser derived browsers configure it to use a system Tor daemon
+// to visit onion services.
+pref("network.http.referer.hideOnionSource", true);
+
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
// Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
// MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02bb195…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/02bb195…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch base-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser
Commits:
926c3f33 by Richard Pospesel at 2023-02-15T13:54:12+00:00
fixup! Firefox preference overrides.
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
(cherry picked from commit 90df17dac724c43bbc533a0f449a72ba419d9d67)
- - - - -
1 changed file:
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -68,6 +68,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
pref("dom.security.https_only_mode", true);
pref("dom.security.https_only_mode_pbm", true);
+// tor-browser#22320: Hide referer when comming from a .onion address
+// We enable this here (rather than in Tor Browser) in case users of other
+// base-browser derived browsers configure it to use a system Tor daemon
+// to visit onion services.
+pref("network.http.referer.hideOnionSource", true);
+
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
// Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
// MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/926c3f3…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/commit/926c3f3…
You're receiving this email because of your account on gitlab.torproject.org.
Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser
Commits:
90df17da by Richard Pospesel at 2023-02-15T13:37:32+00:00
fixup! Firefox preference overrides.
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
- - - - -
a697a2c0 by Richard Pospesel at 2023-02-15T13:38:06+00:00
fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js
bug 41627: Enable network.http.referer.hideOnionSource in base-browser
- - - - -
2 changed files:
- browser/app/profile/000-tor-browser.js
- browser/app/profile/001-base-profile.js
Changes:
=====================================
browser/app/profile/000-tor-browser.js
=====================================
@@ -38,9 +38,6 @@ pref("dom.securecontext.allowlist_onions", true);
// Disable HTTPS-Only mode for .onion domains (tor-browser#19850)
pref("dom.security.https_only_mode.upgrade_onion", false);
-// tor-browser#22320: Hide referer when comming from a .onion address
-pref("network.http.referer.hideOnionSource", true);
-
// Bug 40423/41137: Disable http/3
// We should re-enable it as soon as Tor gets UDP support
pref("network.http.http3.enabled", false);
=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -68,6 +68,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
pref("dom.security.https_only_mode", true);
pref("dom.security.https_only_mode_pbm", true);
+// tor-browser#22320: Hide referer when comming from a .onion address
+// We enable this here (rather than in Tor Browser) in case users of other
+// base-browser derived browsers configure it to use a system Tor daemon
+// to visit onion services.
+pref("network.http.referer.hideOnionSource", true);
+
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
// Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
// MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/33b90e…
--
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/33b90e…
You're receiving this email because of your account on gitlab.torproject.org.