[tor-bugs] #26764 [Applications/Orbot]: HTTP proxy bug in Orbot 16.0.2-RC-1

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Dec 28 04:58:27 UTC 2018


#26764: HTTP proxy bug in Orbot 16.0.2-RC-1
--------------------------------+--------------------------
 Reporter:  soren@…             |          Owner:  n8fr8
     Type:  defect              |         Status:  assigned
 Priority:  Medium              |      Milestone:
Component:  Applications/Orbot  |        Version:
 Severity:  Normal              |     Resolution:
 Keywords:                      |  Actual Points:
Parent ID:                      |         Points:
 Reviewer:                      |        Sponsor:
--------------------------------+--------------------------

Comment (by soren@…):

 Replying to [comment:7 n8fr8]:

 > As for this problem specifically, we moved from using Privoxy inside of
 Orbot as our HTTP proxy, to using the new, built-in HTTP proxy feature now
 available in Tor. Unfortunately, it only supports HTTP Connect proxy
 features, which in the case of Android, seem to only work with HTTPS
 traffic. For most apps, this is fine and a good requirement, to ensure
 traffic moving through Tor is always HTTPS. However, for a browser, which
 may still have HTTP traffic, I see how it can cause problems.

 Thanks for the information.

 > The answer is to just guide your users to use the VPN feature, which
 does work.

 I have been recommending that to users for a while, but that doesn't work
 well in all scenarios.

 https://www.stoutner.com/problems-with-orbot/

 For example, Privacy Browser allows users to quickly toggle proxying
 through Orbot while leaving Orbot connected so that they can access
 resources that are blocked via Tor.  This doesn't work with VPN mode
 enabled, and starting and stopping Orbot takes a lot longer than the quick
 toggle Privacy Browser provides.

 https://redmine.stoutner.com/issues/326

 > You could also consider building your browser from Mozilla's GeckoView
 component, which Firefox Focus uses.

 GeckoView is an interesting project, but it isn't a good fit for Privacy
 Browser.  I have written quite an extensive explanation that is hosted on
 my website.

 https://www.stoutner.com/geckoview/

 The short version is that part of the future of Privacy Browser will be to
 create a rolling fork of Android's WebView called Privacy WebView that
 exposes many more privacy controls that either GeckoView or WebView.
 Privacy WebView will be backwards API compatible with WebView, allowing
 custom ROMs to use it as a drop-in replacement for Android's WebView.
 This is something that is not possible with !GeckoView.

 > This supports SOCKS proxying, which works very well with Tor, and is
 much more secure than relying on Android's WebView.

 SOCKS proxying support is a nice feature, but Privacy WebView will provide
 a more secure web experience that I can see anywhere on the horizon for
 !GeckoView.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/26764#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list