This is an automated email from the git hooks/post-receive script.
pierov pushed a change to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
from 475909e9d0fa amend! Bug 40857: Modified the fat .aar creation file new 10a60cd7c4d0 squash! Firefox preference overrides. new 8fc5b74f10c3 amend! Bug 40562: Added Tor-related preferences to 000-tor-browser.js new 71f0c55b610b fixup! Firefox preference overrides. new a24ee90bbd3f fixup! Firefox preference overrides. new f33d66f2c9b6 fixup! Firefox preference overrides. new 79edf1aba64c fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js
The 6 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "add" were already present in the repository and have only been added to this reference.
Summary of changes: browser/app/profile/000-tor-browser.js | 9 ++ browser/app/profile/001-base-profile.js | 118 +++++++++++++++++--------- mobile/android/app/000-tor-browser-android.js | 26 ++---- 3 files changed, 93 insertions(+), 60 deletions(-)
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit 10a60cd7c4d07d66c57c7aa53e08fff19979b06c Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Tue Nov 15 10:05:14 2022 +0100
squash! Firefox preference overrides.
Bug 40783: Review 000-tor-browser.js and 001-base-profile.js for 102
We reviewed all the preferences we set for 102, and remove a few old ones. See the description of that issue to see all the preferences we believed were still valid for 102, and some brief description for the reasons to keep them. --- browser/app/profile/001-base-profile.js | 53 ++++++++++----------------------- 1 file changed, 15 insertions(+), 38 deletions(-)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index 0d344b55eca8..86684930e896 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -1,12 +1,11 @@ // Preferences to harden Firefox's security and privacy // Do not edit this file.
-// Use the OS locale by default +// Use the OS locale by default (tor-browser#17400) pref("intl.locale.requested", "");
// Disable initial homepage notifications pref("browser.search.update", false); -pref("browser.rights.3.shown", true); pref("startup.homepage_welcome_url", ""); pref("startup.homepage_welcome_url.additional", "");
@@ -31,12 +30,6 @@ pref("app.update.promptWaitTime", 3600); pref("app.update.staging.enabled", false); #endif
-// Disable "Slow startup" warnings and associated disk history -// (bug #13346) -pref("browser.slowStartup.notificationDisabled", true); -pref("browser.slowStartup.maxSamples", 0); -pref("browser.slowStartup.samples", 0); - // Disable the "Refresh" prompt that is displayed for stale profiles. pref("browser.disableResetPrompt", true);
@@ -47,9 +40,6 @@ pref("permissions.memory_only", true); pref("network.cookie.lifetimePolicy", 2); pref("security.nocertdb", true);
-// Enabled LSNG -pref("dom.storage.next_gen", true); - // Disk activity: TBB Directory Isolation pref("browser.download.useDownloadDir", false); pref("browser.download.manager.addToRecentDocs", false); @@ -63,9 +53,8 @@ pref("browser.sessionstore.privacy_level", 2); pref("browser.privatebrowsing.forceMediaMemoryCache", true); pref("media.memory_cache_max_size", 16384);
-// Enable HTTPS-Only mode +// Enable HTTPS-Only mode (tor-browser#19850) pref("dom.security.https_only_mode", true); -pref("dom.security.https_only_mode.upgrade_onion", false);
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 ) // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a @@ -167,7 +156,6 @@ pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
// Disable about:newtab and "first run" experiments pref("messaging-system.rsexperimentloader.enabled", false); -pref("trailhead.firstrun.branches", "");
// [SETTING] General>Browsing>Recommend extensions as you browse (Bug #40700) pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+] @@ -179,6 +167,8 @@ pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false pref("network.trr.resolvers", "");
// Disable the /etc/hosts parser +// If true, entries from /etc/hosts will be excluded **from TRR results**. +// Vice-versa, if it is false, TRR will override any /etc/hosts customization. pref("network.trr.exclude-etc-hosts", false);
// Disable crlite @@ -186,11 +176,6 @@ pref("security.pki.crlite_mode", 0);
// Disable website password breach alerts pref("signon.management.page.breach-alerts.enabled", false); -pref("extensions.fxmonitor.enabled", false); - -// Remove mobile app tracking URLs -pref("signon.management.page.mobileAndroidURL", ""); -pref("signon.management.page.mobileAppleURL", "");
// Disable remote "password recipes" pref("signon.recipes.remoteRecipes.enabled", false); @@ -222,15 +207,11 @@ pref("security.remote_settings.intermediates.enabled", false); pref("dom.use_components_shim", false); // Enable letterboxing pref("privacy.resistFingerprinting.letterboxing", true); -// Disable network information API everywhere. It gets spoofed in bug 1372072 -// but, alas, the behavior is inconsistent across platforms, see: -// https://trac.torproject.org/projects/tor/ticket/27268#comment:19. We should -// not leak that difference if possible. +// Enforce Network Information API as disabled pref("dom.netinfo.enabled", false); pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer behavior consistent regardless of private browing mode status pref("network.http.referer.XOriginTrimmingPolicy", 2); // Bug 17228: Force trim referer to scheme+host+port in cross-origin requests pref("media.videocontrols.picture-in-picture.enabled", false); // Bug 40148: disable until audited in #40147 -pref("network.http.referer.hideOnionSource", true); // Bug 40463: Disable Windows SSO pref("network.http.windows-sso.enabled", false); // Bug 40383: Disable new PerformanceEventTiming @@ -240,6 +221,7 @@ pref("dom.textMetrics.actualBoundingBox.enabled", false); pref("dom.textMetrics.baselines.enabled", false); pref("dom.textMetrics.emHeight.enabled", false); pref("dom.textMetrics.fontBoundingBox.enabled", false); +// tor-browser#40424 pref("pdfjs.enableScripting", false); pref("javascript.options.large_arraybuffers", false); // Bug 40057: Ensure system colors are not used for CSS4 colors @@ -251,7 +233,7 @@ pref("privacy.partition.network_state", false); // Disable for now until audit pref("network.cookie.cookieBehavior", 1); pref("network.cookie.cookieBehavior.pbmode", 1); pref("network.predictor.enabled", false); // Temporarily disabled. See https://bugs.torproject.org/16633 -// Bug 40177: Make sure tracker cookie purging is disabled +// Bug 40220: Make sure tracker cookie purging is disabled pref("privacy.purge_trackers.enabled", false);
pref("network.dns.disablePrefetch", true); @@ -289,8 +271,8 @@ pref("network.http.http2.default-hpack-buffer", 65536, locked); pref("network.http.http2.websockets", false, locked); pref("network.http.http2.enable-hpack-dump", false, locked);
-// Make sure we don't have any GIO supported protocols (defense in depth -// measure) +// tor-browser#23044: Make sure we don't have any GIO supported protocols +// (defense in depth measure) pref("network.gio.supported-protocols", ""); pref("media.peerconnection.enabled", false); // Disable WebRTC interfaces // Disables media devices but only if `media.peerconnection.enabled` is set to @@ -300,6 +282,7 @@ pref("media.navigator.enabled", false); // We make sure they don't show up on the Add-on panel and confuse users. // And the external update/donwload server must not get pinged. We apply a // clever solution for https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769716. +// See tor-browser#15910. pref("media.gmp-provider.enabled", false); pref("media.gmp-manager.url.override", "data:text/plain,"); // Since ESR52 it is not enough anymore to block pinging the GMP update/download @@ -315,10 +298,6 @@ pref("media.gmp-widevinecdm.visible", false); pref("media.gmp-widevinecdm.enabled", false); pref("media.eme.enabled", false); pref("media.mediadrm-widevinecdm.visible", false); -// WebIDE can bypass proxy settings for remote debugging. It also downloads -// some additional addons that we have not reviewed. Turn all that off. -pref("devtools.webide.autoinstallADBExtension", false); -pref("devtools.webide.enabled", false); // The in-browser debugger for debugging chrome code is not coping with our // restrictive DNS look-up policy. We use "127.0.0.1" instead of "localhost" as // a workaround. See bug 16523 for more details. @@ -326,7 +305,7 @@ pref("devtools.debugger.chrome-debugging-host", "127.0.0.1"); // Disable using UNC paths (bug 26424 and Mozilla's bug 1413868) pref("network.file.disable_unc_paths", true); // Enhance our treatment of file:// to avoid proxy bypasses (see Mozilla's bug -// 1412081) +// 1412081 and CVE-2017-16541) pref("network.file.path_blacklist", "/net");
// Security slider @@ -338,19 +317,18 @@ pref("svg.context-properties.content.allowed-domains", "");
// Network and performance pref("security.ssl.enable_false_start", true); -pref("network.http.connection-retry-timeout", 0); +// tor-browser#18945 pref("network.manage-offline-status", false); // No need to leak things to Mozilla, see bug 21790 and tor-browser#40322 pref("network.captive-portal-service.enabled", false); pref("network.connectivity-service.enabled", false); // As a "defense in depth" measure, configure an empty push server URL (the // DOM Push features are disabled by default via other prefs). +// See tor-browser#18801. pref("dom.push.serverURL", "");
// Extension support pref("extensions.autoDisableScopes", 0); -pref("extensions.bootstrappedAddons", "{}"); -pref("extensions.checkCompatibility.4.*", false); pref("extensions.databaseSchema", 3); pref("extensions.enabledScopes", 5); // AddonManager.SCOPE_PROFILE=1 | AddonManager.SCOPE_APPLICATION=4 pref("extensions.pendingOperations", false); @@ -360,6 +338,7 @@ pref("extensions.pendingOperations", false); pref("extensions.getAddons.showPane", false); pref("extensions.htmlaboutaddons.recommendations.enabled", false); // Bug 26114: Allow NoScript to access addons.mozilla.org etc. +// TODO: Audit again (tor-browser#41445) pref("extensions.webextensions.restrictedDomains", ""); // Don't give Mozilla-recommended third-party extensions special privileges. pref("extensions.postDownloadThirdPartyPrompt", false); @@ -398,11 +377,9 @@ pref("browser.share_menu.allow", false, locked);
// Disable special URL bar behaviors pref("browser.urlbar.suggest.topsites", false); -pref("browser.urlbar.update1.interventions", false); -pref("browser.urlbar.update1.searchTips", false);
// Skip checking omni.ja and other files for corruption since the result -// is only reported via telemetry (which is disabled). +// is only reported via telemetry (which is disabled). See tor-browser#40048. pref("corroborator.enabled", false);
// Onboarding.
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit 8fc5b74f10c3cbe0611154169d9e8ae7aafdd2b0 Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Tue Nov 15 10:20:50 2022 +0100
amend! Bug 40562: Added Tor-related preferences to 000-tor-browser.js
Bug 40562: Added Tor Browser preferences to 000-tor-browser.js
Before reordering patches, we used to keep the Tor-related patches (torbutton and tor-launcher) at the beginning. After that issue, we decided to move them towards the end.
In addition to that, we have decided to move Tor Browser-only preferences there, too, to make Base Browser-only fixups easier to apply. --- browser/app/profile/000-tor-browser.js | 9 +++++++++ 1 file changed, 9 insertions(+)
diff --git a/browser/app/profile/000-tor-browser.js b/browser/app/profile/000-tor-browser.js index be6473555aa2..b8fd6e4e239d 100644 --- a/browser/app/profile/000-tor-browser.js +++ b/browser/app/profile/000-tor-browser.js @@ -35,10 +35,19 @@ pref("browser.uiCustomization.state", "{"placements":{"widget-overflow-fixed- // Treat .onions as secure pref("dom.securecontext.allowlist_onions", true);
+// Disable HTTPS-Only mode for .onion domains (tor-browser#19850) +pref("dom.security.https_only_mode.upgrade_onion", false); + +// tor-browser#22320: Hide referer when comming from a .onion address +pref("network.http.referer.hideOnionSource", true); + // Bug 40423/41137: Disable http/3 // We should re-enable it as soon as Tor gets UDP support pref("network.http.http3.enabled", false);
+// 0 = do not use a second connection, see all.js and #7656 +pref("network.http.connection-retry-timeout", 0); + #expand pref("torbrowser.version", __TOR_BROWSER_VERSION_QUOTED__);
// Old torbutton prefs
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit 71f0c55b610b797a430c38ea10e7502fca765791 Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Tue Nov 15 15:41:12 2022 +0100
fixup! Firefox preference overrides.
Less trivial changes (e.g., defense in depth, or things that were not that obvious). --- browser/app/profile/001-base-profile.js | 21 +++++++++++++++++---- 1 file changed, 17 insertions(+), 4 deletions(-)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index 86684930e896..038fb91a2c11 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -103,15 +103,23 @@ pref("datareporting.policy.dataSubmissionEnabled", false); // Make sure Unified Telemetry is really disabled, see: #18738. pref("toolkit.telemetry.unified", false); pref("toolkit.telemetry.enabled", false); +pref("toolkit.telemetry.archive.enabled", false); pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. #ifdef XP_WIN // Defense-in-depth: ensure that the Windows default browser agent will // not ping Mozilla if it is somehow present (we omit it at build time). pref("default-browser-agent.enabled", false); #endif -pref("identity.fxaccounts.enabled", false); // Disable sync by default -pref("services.sync.engine.prefs", false); // Never sync prefs, addons, or tabs with other browsers +// Disable sync by default +pref("identity.fxaccounts.enabled", false); +// Never sync with other browsers pref("services.sync.engine.addons", false); +pref("services.sync.engine.addresses", false); +pref("services.sync.engine.bookmarks", false); +pref("services.sync.engine.creditcards", false); +pref("services.sync.engine.history", false); +pref("services.sync.engine.passwords", false); +pref("services.sync.engine.prefs", false); pref("services.sync.engine.tabs", false); pref("extensions.getAddons.cache.enabled", false); // https://blog.mozilla.org/addons/how-to-opt-out-of-add-on-metadata-updates/ pref("browser.newtabpage.enabled", false); @@ -145,6 +153,7 @@ pref("extensions.webcompat-reporter.enabled", false); // Disable use of WiFi location information pref("browser.region.network.scan", false); pref("browser.region.network.url", ""); +pref("browser.region.local-geocoding", false); // Bug 40083: Make sure Region.jsm fetching is disabled pref("browser.region.update.enabled", false);
@@ -156,6 +165,8 @@ pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0);
// Disable about:newtab and "first run" experiments pref("messaging-system.rsexperimentloader.enabled", false); +// true means that you are *not* opting out. See its usage in various file. +pref("app.shield.optoutstudies.enabled", false);
// [SETTING] General>Browsing>Recommend extensions as you browse (Bug #40700) pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+] @@ -164,7 +175,7 @@ pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.features", false); // disable CFR [FF67+]
// Clear the list of trusted recursive resolver services -pref("network.trr.resolvers", ""); +pref("network.trr.default_provider_uri", "");
// Disable the /etc/hosts parser // If true, entries from /etc/hosts will be excluded **from TRR results**. @@ -185,6 +196,7 @@ pref("dom.serviceWorkers.enabled", false); pref("dom.push.enabled", false);
// Fingerprinting +pref("privacy.resistFingerprinting", true); pref("webgl.disable-fail-if-major-performance-caveat", true); pref("webgl.enable-webgl2", false); pref("browser.startup.homepage_override.buildID", "20100101"); @@ -192,7 +204,6 @@ pref("browser.link.open_newwindow.restriction", 0); // Bug 9881: Open popups in // Set video VP9 to 0 for everyone (bug 22548) pref("media.benchmark.vp9.threshold", 0); pref("dom.enable_resource_timing", false); // Bug 13024: To hell with this API -pref("privacy.resistFingerprinting", true); pref("privacy.resistFingerprinting.block_mozAddonManager", true); // Bug 26114 pref("dom.webaudio.enabled", false); // Bug 13017: Disable Web Audio API pref("dom.webmidi.enabled", false); // Bug 41398: Disable Web MIDI API @@ -210,6 +221,7 @@ pref("privacy.resistFingerprinting.letterboxing", true); // Enforce Network Information API as disabled pref("dom.netinfo.enabled", false); pref("network.http.referer.defaultPolicy", 2); // Bug 32948: Make referer behavior consistent regardless of private browing mode status +pref("network.http.referer.defaultPolicy.pbmode", 2); pref("network.http.referer.XOriginTrimmingPolicy", 2); // Bug 17228: Force trim referer to scheme+host+port in cross-origin requests pref("media.videocontrols.picture-in-picture.enabled", false); // Bug 40148: disable until audited in #40147 // Bug 40463: Disable Windows SSO @@ -237,6 +249,7 @@ pref("network.predictor.enabled", false); // Temporarily disabled. See https://b pref("privacy.purge_trackers.enabled", false);
pref("network.dns.disablePrefetch", true); +pref("network.dns.disablePrefetchFromHTTPS", true); pref("network.protocol-handler.external-default", false); pref("network.protocol-handler.external.mailto", false); pref("network.protocol-handler.external.news", false);
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit a24ee90bbd3f1198617d626ef1e7bb56a20ef786 Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Wed Nov 16 12:50:41 2022 +0100
fixup! Firefox preference overrides.
Trivial-lish preferences from Arkenfox. --- browser/app/profile/001-base-profile.js | 41 +++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index 038fb91a2c11..3f27d1ba410c 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -55,6 +55,7 @@ pref("media.memory_cache_max_size", 16384);
// Enable HTTPS-Only mode (tor-browser#19850) pref("dom.security.https_only_mode", true); +pref("dom.security.https_only_mode_pbm", true);
// Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 ) // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a @@ -84,7 +85,14 @@ pref("security.ssl3.rsa_aes_256_sha", false, locked); pref("browser.send_pings", false); pref("geo.enabled", false); pref("geo.provider.network.url", ""); +pref("geo.provider.ms-windows-location", false); +pref("geo.provider.use_corelocation", false); +pref("geo.provider.use_gpsd", false); +pref("geo.provider.use_geoclue", false); pref("browser.search.suggest.enabled", false); +pref("browser.urlbar.suggest.searches", false); +pref("browser.urlbar.suggest.quicksuggest.nonsponsored", false); +pref("browser.urlbar.suggest.quicksuggest.sponsored", false); pref("browser.safebrowsing.malware.enabled", false); pref("browser.safebrowsing.phishing.enabled", false); pref("browser.safebrowsing.downloads.enabled", false); @@ -103,8 +111,16 @@ pref("datareporting.policy.dataSubmissionEnabled", false); // Make sure Unified Telemetry is really disabled, see: #18738. pref("toolkit.telemetry.unified", false); pref("toolkit.telemetry.enabled", false); +pref("toolkit.telemetry.server", "data:,"); pref("toolkit.telemetry.archive.enabled", false); pref("toolkit.telemetry.updatePing.enabled", false); // Make sure updater telemetry is disabled; see #25909. +pref("toolkit.telemetry.bhrPing.enabled", false); +pref("toolkit.telemetry.coverage.opt-out", true); +pref("toolkit.coverage.opt-out", true); +pref("toolkit.coverage.endpoint.base", ""); +pref("browser.ping-centre.telemetry", false); +pref("browser.tabs.crashReporting.sendReport", false); +pref("browser.crashReports.unsubmittedCheck.autoSubmit2", false); #ifdef XP_WIN // Defense-in-depth: ensure that the Windows default browser agent will // not ping Mozilla if it is somehow present (we omit it at build time). @@ -142,6 +158,11 @@ pref("extensions.pocket.enabled", false); // Disable activity stream/"Recommended by Pocket" in about:home (Bug #41029) pref("browser.newtabpage.activity-stream.discoverystream.enabled", false); pref("browser.newtabpage.activity-stream.feeds.section.topstories", false); +pref("browser.newtabpage.activity-stream.showSponsored", false); +pref("browser.newtabpage.activity-stream.showSponsoredTopSites", false); +pref("browser.newtabpage.activity-stream.default.sites", ""); +pref("browser.newtabpage.activity-stream.feeds.telemetry", false); +pref("browser.newtabpage.activity-stream.telemetry", false);
// Disable moreFromMozilla pane in the preferences/settings (tor-browser#41292). pref("browser.preferences.moreFromMozilla", false); @@ -167,6 +188,9 @@ pref("browser.urlbar.dnsResolveSingleWordsAfterSearch", 0); pref("messaging-system.rsexperimentloader.enabled", false); // true means that you are *not* opting out. See its usage in various file. pref("app.shield.optoutstudies.enabled", false); +// Disable Normandy/Shield +pref("app.normandy.enabled", false); +pref("app.normandy.api_url", "");
// [SETTING] General>Browsing>Recommend extensions as you browse (Bug #40700) pref("browser.newtabpage.activity-stream.asrouter.userprefs.cfr.addons", false); // disable CFR [FF67+] @@ -183,6 +207,7 @@ pref("network.trr.default_provider_uri", ""); pref("network.trr.exclude-etc-hosts", false);
// Disable crlite +pref("security.remote_settings.crlite_filters.enabled", false); pref("security.pki.crlite_mode", 0);
// Disable website password breach alerts @@ -201,6 +226,8 @@ pref("webgl.disable-fail-if-major-performance-caveat", true); pref("webgl.enable-webgl2", false); pref("browser.startup.homepage_override.buildID", "20100101"); pref("browser.link.open_newwindow.restriction", 0); // Bug 9881: Open popups in new tabs (to avoid fullscreen popups) +// Prevent scripts from moving and resizing open windows +pref("dom.disable_window_move_resize", true); // Set video VP9 to 0 for everyone (bug 22548) pref("media.benchmark.vp9.threshold", 0); pref("dom.enable_resource_timing", false); // Bug 13024: To hell with this API @@ -245,8 +272,18 @@ pref("privacy.partition.network_state", false); // Disable for now until audit pref("network.cookie.cookieBehavior", 1); pref("network.cookie.cookieBehavior.pbmode", 1); pref("network.predictor.enabled", false); // Temporarily disabled. See https://bugs.torproject.org/16633 +pref("network.predictor.enable-prefetch", false); +pref("network.http.speculative-parallel-limit", 0); +pref("browser.places.speculativeConnect.enabled", false); +pref("network.prefetch-next", false); +pref("browser.urlbar.speculativeConnect.enabled", false); // Bug 40220: Make sure tracker cookie purging is disabled pref("privacy.purge_trackers.enabled", false); +// Do not allow cross-origin sub-resources to open HTTP authentication +// credentials dialogs. Hardens against potential credentials phishing. +pref("network.auth.subresource-http-auth-allow", 1); +// Disable sending additional analytics to web servers +pref("beacon.enabled", false);
pref("network.dns.disablePrefetch", true); pref("network.dns.disablePrefetchFromHTTPS", true); @@ -335,6 +372,7 @@ pref("network.manage-offline-status", false); // No need to leak things to Mozilla, see bug 21790 and tor-browser#40322 pref("network.captive-portal-service.enabled", false); pref("network.connectivity-service.enabled", false); +pref("captivedetect.canonicalURL", ""); // As a "defense in depth" measure, configure an empty push server URL (the // DOM Push features are disabled by default via other prefs). // See tor-browser#18801. @@ -350,6 +388,9 @@ pref("extensions.pendingOperations", false); // about:addons page, see bug 22073, 22900 and 31601. pref("extensions.getAddons.showPane", false); pref("extensions.htmlaboutaddons.recommendations.enabled", false); +// Disable personalized Extension Recommendations in about:addons and +// addons.mozilla.org +pref("browser.discovery.enabled", false); // Bug 26114: Allow NoScript to access addons.mozilla.org etc. // TODO: Audit again (tor-browser#41445) pref("extensions.webextensions.restrictedDomains", "");
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit f33d66f2c9b68ac2127aaf6fd9fa8b28ef4ed409 Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Wed Nov 16 15:31:36 2022 +0100
fixup! Firefox preference overrides.
Add webchannel.allowObject.urlWhitelist to all platforms. --- browser/app/profile/001-base-profile.js | 3 +++ 1 file changed, 3 insertions(+)
diff --git a/browser/app/profile/001-base-profile.js b/browser/app/profile/001-base-profile.js index 3f27d1ba410c..eb2fb6ce458e 100644 --- a/browser/app/profile/001-base-profile.js +++ b/browser/app/profile/001-base-profile.js @@ -83,6 +83,9 @@ pref("security.ssl3.rsa_aes_256_sha", false, locked);
// Misc privacy: Remote pref("browser.send_pings", false); +// Space separated list of URLs that are allowed to send objects (instead of +// only strings) through webchannels. +pref("webchannel.allowObject.urlWhitelist", ""); pref("geo.enabled", false); pref("geo.provider.network.url", ""); pref("geo.provider.ms-windows-location", false);
This is an automated email from the git hooks/post-receive script.
pierov pushed a commit to branch tor-browser-102.4.0esr-12.0-2 in repository tor-browser.
commit 79edf1aba64c0d8714f0c821354e939914ab45ad Author: Pier Angelo Vendrame pierov@torproject.org AuthorDate: Wed Nov 16 15:33:29 2022 +0100
fixup! Bug 40562: Added Tor-related preferences to 000-tor-browser.js
Bug 40014: Updated GV preferences --- mobile/android/app/000-tor-browser-android.js | 26 ++++++++------------------ 1 file changed, 8 insertions(+), 18 deletions(-)
diff --git a/mobile/android/app/000-tor-browser-android.js b/mobile/android/app/000-tor-browser-android.js index 61c8a0cd7fa1..7d440ec6a66e 100644 --- a/mobile/android/app/000-tor-browser-android.js +++ b/mobile/android/app/000-tor-browser-android.js @@ -5,24 +5,20 @@
#include ../../../browser/app/profile/000-tor-browser.js
-// Space separated list of URLs that are allowed to send objects (instead of -// only strings) through webchannels. This list is duplicated in browser/app/profile/firefox.js -pref("webchannel.allowObject.urlWhitelist", ""); - // Disable browser auto updaters pref("app.update.auto", false); pref("browser.startup.homepage_override.mstone", "ignore");
// Clear data on quit pref("privacy.clearOnShutdown.cache", true); -pref("privacy.clearOnShutdown.cookies",true); -pref("privacy.clearOnShutdown.downloads",true); -pref("privacy.clearOnShutdown.formdata",true); -pref("privacy.clearOnShutdown.history",true); -pref("privacy.clearOnShutdown.offlineApps",true); -pref("privacy.clearOnShutdown.passwords",true); -pref("privacy.clearOnShutdown.sessions",true); -pref("privacy.clearOnShutdown.siteSettings",true); +pref("privacy.clearOnShutdown.cookies", true); +pref("privacy.clearOnShutdown.downloads", true); +pref("privacy.clearOnShutdown.formdata", true); +pref("privacy.clearOnShutdown.history", true); +pref("privacy.clearOnShutdown.offlineApps", true); +pref("privacy.clearOnShutdown.passwords", true); +pref("privacy.clearOnShutdown.sessions", true); +pref("privacy.clearOnShutdown.siteSettings", true);
// controls if we want camera support pref("media.realtime_decoder.enabled", false); @@ -30,15 +26,9 @@ pref("media.realtime_decoder.enabled", false); // Enable touch events on Android (highlighting text, etc) pref("dom.w3c_touch_events.enabled", 2);
-// Ensure that pointer events are disabled -pref("dom.w3c_pointer_events.multiprocess.android.enabled", false); - // No HLS support for now due to browser freezing, see: #29859. pref("media.hls.enabled", false);
-// Inherit locale from the OS, used for multi-locale builds -pref("intl.locale.requested", ""); - // Disable WebAuthn. It requires Google Play Services, so it isn't // available, but avoid any potential problems. pref("security.webauth.webauthn_enable_android_fido2", false);
tor-commits@lists.torproject.org