[tor-commits] [Git][tpo/applications/tor-browser][tor-browser-102.8.0esr-12.5-1] 2 commits: fixup! Firefox preference overrides.

Richard Pospesel (@richard) git at gitlab.torproject.org
Wed Feb 15 13:53:38 UTC 2023



Richard Pospesel pushed to branch tor-browser-102.8.0esr-12.5-1 at The Tor Project / Applications / Tor Browser


Commits:
90df17da by Richard Pospesel at 2023-02-15T13:37:32+00:00
fixup! Firefox preference overrides.

bug 41627: Enable network.http.referer.hideOnionSource in base-browser

- - - - -
a697a2c0 by Richard Pospesel at 2023-02-15T13:38:06+00:00
fixup! Bug 40562: Added Tor Browser preferences to 000-tor-browser.js

bug 41627: Enable network.http.referer.hideOnionSource in base-browser

- - - - -


2 changed files:

- browser/app/profile/000-tor-browser.js
- browser/app/profile/001-base-profile.js


Changes:

=====================================
browser/app/profile/000-tor-browser.js
=====================================
@@ -38,9 +38,6 @@ pref("dom.securecontext.allowlist_onions", true);
 // Disable HTTPS-Only mode for .onion domains (tor-browser#19850)
 pref("dom.security.https_only_mode.upgrade_onion", false);
 
-// tor-browser#22320: Hide referer when comming from a .onion address
-pref("network.http.referer.hideOnionSource", true);
-
 // Bug 40423/41137: Disable http/3
 // We should re-enable it as soon as Tor gets UDP support
 pref("network.http.http3.enabled", false);


=====================================
browser/app/profile/001-base-profile.js
=====================================
@@ -68,6 +68,12 @@ pref("browser.pagethumbnails.capturing_disabled", true);
 pref("dom.security.https_only_mode", true);
 pref("dom.security.https_only_mode_pbm", true);
 
+// tor-browser#22320: Hide referer when comming from a .onion address
+// We enable this here (rather than in Tor Browser) in case users of other
+// base-browser derived browsers configure it to use a system Tor daemon
+// to visit onion services.
+pref("network.http.referer.hideOnionSource", true);
+
 // Require Safe Negotiation ( https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27719 )
 // Blocks connections to servers that don't support RFC 5746 [2] as they're potentially vulnerable to a
 // MiTM attack [3]. A server without RFC 5746 can be safe from the attack if it disables renegotiations



View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/33b90e5e1ea36001dc33f97c91bfaba99ca982b1...a697a2c0dfb46591f6d497ae7178be3a55d55fc7

-- 
View it on GitLab: https://gitlab.torproject.org/tpo/applications/tor-browser/-/compare/33b90e5e1ea36001dc33f97c91bfaba99ca982b1...a697a2c0dfb46591f6d497ae7178be3a55d55fc7
You're receiving this email because of your account on gitlab.torproject.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-commits/attachments/20230215/2123ba54/attachment-0001.htm>


More information about the tor-commits mailing list