[tor-bugs] #24622 [Applications/Tor Browser]: Torcrazybutton can't decipher website s3.amazonaws.com

Tor Bug Tracker & Wiki blackhole at torproject.org
Tue Apr 9 06:56:28 UTC 2019


#24622: Torcrazybutton can't decipher website s3.amazonaws.com
-------------------------------------------------+-------------------------
 Reporter:  cypherpunks                          |          Owner:  tbb-
                                                 |  team
     Type:  defect                               |         Status:
                                                 |  needs_review
 Priority:  Medium                               |      Milestone:
Component:  Applications/Tor Browser             |        Version:
 Severity:  Major                                |     Resolution:
 Keywords:  tbb-7.0-issues, tbb-regression,      |  Actual Points:
  tbb-linkability, GeorgKoppen201903,            |
  TorBrowserTeam201904                           |
Parent ID:                                       |         Points:
 Reviewer:                                       |        Sponsor:
-------------------------------------------------+-------------------------

Comment (by gk):

 Replying to [comment:43 acat]:
 > Here is a patch: https://github.com/acatarineu/tor-browser/commit/24622
 >
 > Not sure if we should wait for more feedback on
 https://bugzilla.mozilla.org/show_bug.cgi?id=1542309. Implemented dveditz
 first suggestion, the alternative I see is to try to fix it just on
 torbutton by looking at the special case when firstPartyOrigin is empty,
 and try to get it from somewhere else
 (nsiChannel.loadInfo.loadingPrincipal?)

 I think that approach is good and we should get the fix into Firefox as
 Mozilla's users are affected by this problem as well.

 Regarding your patch: why did you deal with the insufficient domain level
 case in the code block that is concerned with the scheme of the URL? It
 seems it does not fit there. What about having a special block before that
 one like the ip address error one. It could start with
 `if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS) {` followed by the
 remainder of your patch. Or maybe you use the ip address error block and
 do a `else if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS) {` treating both
 error cases together. That might even be better.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/24622#comment:45>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list