#33962: Uplift patch for 5741 (dns leak protection) -------------------------------------------------+------------------------- Reporter: acat | Owner: acat Type: task | Status: | accepted Priority: Medium | Milestone: Component: Applications/Tor Browser | Version: Severity: Normal | Resolution: Keywords: ReleaseTrainMigration | Actual Points: TorBrowserTeam202005R | Parent ID: | Points: Reviewer: | Sponsor: | Sponsor58 -------------------------------------------------+-------------------------
Comment (by acat): I created https://bugzilla.mozilla.org/show_bug.cgi?id=1636411, expecting that it has good chances to be accepted and we can just flip `networking.dns.disabled` to have the same protection as this patch. I think the logic for proxy bypass protection when `networking.dns.disabled = false` can be implemented later independently of that, but I assume that will be not so easy to be accepted (or to get right). But, unless I'm missing something, I don't think we really need to support resolving DNS correctly if some user disables the SOCKS proxy and wants a direct internet connection. That can only be done via `about:prefs`, so that user would just need to edit one more pref to achieve that. -- Ticket URL: <https://trac.torproject.org/projects/tor/ticket/33962#comment:7> Tor Bug Tracker & Wiki <https://trac.torproject.org/> The Tor Project: anonymity online
_______________________________________________ tor-bugs mailing list tor-bugs@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs