[tor-bugs] #27313 [Applications/Tor Browser]: Help NoScript marking HTTP .onions as secure

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 9 13:43:09 UTC 2019


#27313: Help NoScript marking HTTP .onions as secure
--------------------------------------+---------------------------
 Reporter:  gk                        |          Owner:  tbb-team
     Type:  enhancement               |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:  noscript                  |  Actual Points:
Parent ID:  #21728                    |         Points:
 Reviewer:                            |        Sponsor:  Sponsor27
--------------------------------------+---------------------------

Comment (by gk):

 Blech, commented on the wrong ticket:

 Thanks, that's better. There is still the scary http: in red which should
 not be relevant for .onions either. Additionally, the expectation here is
 that onions over http:// on medium level security can actually run
 JavaScript etc. because http:// is secure for .onion domains They should
 get treated as loaded over https://. Could you address those two items for
 Tor Browser users? (I am fine opening a new bug for the latter if you
 like)

 A general note, while testing rc11:

 1) After installing it in the browser I needed to click twice on the
 NoScript icon until the page related info showed up. On first click only a
 small empty menu was visible.
 2) After restarting the browser it takes like 5-10 second until the
 NoScript icon gets clickable at all and CPU of my laptop gets eaten
 meanwhile. There is something computationally heavy going on in the
 background here...

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27313#comment:6>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list