[tor-bugs] #27307 [Applications/Tor Browser]: NoScript marks HTTP Onion as insecure

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Oct 28 09:57:05 UTC 2019


#27307: NoScript marks HTTP Onion as insecure
---------------------------------------------+--------------------------
 Reporter:  cypherpunks3                     |          Owner:  tbb-team
     Type:  defect                           |         Status:  reopened
 Priority:  Low                              |      Milestone:
Component:  Applications/Tor Browser         |        Version:
 Severity:  Minor                            |     Resolution:
 Keywords:  noscript, TorBrowserTeam201910R  |  Actual Points:
Parent ID:                                   |         Points:
 Reviewer:                                   |        Sponsor:
---------------------------------------------+--------------------------
Changes (by gk):

 * status:  closed => reopened
 * keywords:  noscript => noscript, TorBrowserTeam201910R
 * resolution:  wontfix =>


Comment:

 Replying to [comment:8 ma1]:
 > Replying to [comment:7 gk]:
 > > There is still the scary http: in red which should not be relevant for
 .onions either. Additionally, the expectation here is that onions over
 http:// on medium level security can actually run JavaScript etc. because
 http:// is secure for .onion domains They should get treated as loaded
 over https://. Could you address those two items for Tor Browser users? (I
 am fine opening a new bug for the latter if you like)
 >
 > Not sure if you opened another bug (if you did, sorry for the cross-
 posting): I've addressed this in
 https://github.com/hackademix/noscript/releases/tag/11.0.4rc15

 No, I did not as I actually found an already open ticket for that: #21004.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/27307#comment:9>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list