[tor-bugs] #5477 [EFF-HTTPS Everywhere]: Surprising DOM origins before HTTPS-E/NoScript redirects have completed

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Wed Apr 18 19:01:52 UTC 2012


#5477: Surprising DOM origins before HTTPS-E/NoScript redirects have completed
------------------------------------------------------+---------------------
 Reporter:  Drugoy                                    |          Owner:  ma1           
     Type:  defect                                    |         Status:  needs_revision
 Priority:  major                                     |      Milestone:                
Component:  EFF-HTTPS Everywhere                      |        Version:                
 Keywords:  address spoofing, critical vulnerability  |         Parent:                
   Points:                                            |   Actualpoints:                
------------------------------------------------------+---------------------
Changes (by mikeperry):

  * status:  needs_review => needs_revision


Comment:

 ma1: We're running into some issues getting those patches to apply with
 'git am' for some reason.. I first suspected dos line breaks as the issue,
 but removing them didn't seem to help. Applying the patch manually with
 'patch' causes an exception to be generated: http://pastebin.com/t8KvVQJr

 Also, I think I'd prefer it if we can keep our codebases closer in sync. I
 am assuming that if I just rename IOUtil.js to ChannelReplacement.js, I
 should be able to re-produce that patch, right? (Note the last time we
 synced with NoScript was noscript-2.0.9.8rc1).

 I'm going to give that a shot right now.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5477#comment:18>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list