[tor-bugs] #18546 [Tor Browser]: Review networking code for Firefox 45

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Apr 8 23:03:54 UTC 2016


#18546: Review networking code for Firefox 45
-------------------------------------------------+-------------------------
 Reporter:  gk                                   |          Owner:
     Type:  task                                 |  mikeperry
 Priority:  Very High                            |         Status:
Component:  Tor Browser                          |  assigned
 Severity:  Critical                             |      Milestone:
 Keywords:  ff45-esr, MikePerry201604,           |        Version:
  TorBrowserTeam201604                           |     Resolution:
Parent ID:                                       |  Actual Points:
 Reviewer:                                       |         Points:
                                                 |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by mikeperry):

 I pushed my partial progress to: https://gitweb.torproject.org/tor-
 browser-spec.git/tree/audits/FF45_NETWORK_AUDIT

 Everything that could use a double-check is flagged with XXX.

 Here's the quick notes for stuff that really needs another set of eyes:
  * We need to verify the proper application of our OCSP and NSS safety
 patches in security/nss. Last time we improperly applied the DNS patch
 while rebasing. That might happen again here, too.
  * We should make sure that ./netwerk/dns/mdns/libmdns/ is Android only
 and also disabled for OrFox
  * The "Presentation API" stuff seems new, but possibly not enabled yet.
 It has lots of networking things. We should make sure it is disabled.
  * The nsDNSService patches should be verified for the same reason as the
 NSS ones
  * There's some resolver stuff in Android that uses SOCK_DGRAM. We should
 make sure this is not active in OrFox
  * It looks like ./toolkit/modules/secondscreen/SimpleServiceDiscovery.jsm
 is included now? Can we kill it? And what is this second screen stuff?
  * dom.udpsocket and dom.moztcpsocket are still off, yes?
  * We disabled/patched the debugger and related discovery stuff before,
 right? Is that still off?

 Here's some stuff we should fix:
   * We should get rid of the damn DNS lookup for localhost in
 toolkit/profile/nsProfileLock.cpp
   * We should patch the "Network Tickler" to be disabled for real, since
 it looks like it may now apply to the desktop as well. A simple return in
 nsHttpHandler::TickleWifi() should do the trick, I think.
   * We should disable all of the dom.push.* prefs. Even though it seems
 that only ServiceWorkers can use Push, it would be good for us to ensure
 now that if we decide to enable ServiceWorkers, push stays off
   * Shumway (the flash previewer/player) can bypass proxy settings. If it
 is compiled in, we should rip it out/disable it at build time, so nobody
 enables it.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/18546#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list