Skip to content
Permalink
20414+8

Commits on Oct 20, 2016

  1. Bug 20111: use Unix domain sockets for SOCKS port by default

    Retrieve SOCKS port configuration from Tor Launcher if available.
    Support the TOR_SOCKS_IPC_PATH environment variable.
    
    Consistently use IPC to refer to Unix domain sockets.
    
    Enhance torbutton_local_tor_check() to correctly handle spaces and
    escaped characters within the 'GETINFO net/listeners/socks' response.
    
    Within startup-observer.js, use Services.jsm, Cc and similar
    constants, and remove unused code.
    Kathy Brade authored and gk-tpo committed Oct 20, 2016
  2. Bug 20394: Remove obsolete code

    arthuredelstein authored and gk-tpo committed Oct 20, 2016

Commits on Oct 14, 2016

  1. Bug 20244.4: Remove 'Change details that distinguish you...' checkbox

    Also, remove the 'extensions.torbutton.resist_fingerprinting' pref
    and just use the 'privacy.resistFingerprinting' pref instead. We will
    use this to implement a checkbox in the about:preferences#privacy page.
    arthuredelstein committed Oct 14, 2016
  2. Bug 20244.3: Remove 'restrict third party cookies...' checkbox

    Also, we remove the 'extensions.torbutton.restrict_thirdparty'
    and use the 'privacy.thirdparty.isolate' pref. At the same time we
    will need to add a checkbox to the about:preferences#privacy page
    that toggles 'privacy.thirdparty.isolate'.
    
    Note that 'privacy.thirdparty.isolate' will be renamed to
    'privacy.firstparty.isolate' in Firefox 52.
    arthuredelstein committed Oct 14, 2016
  3. Bug 20244.2: Remove 'disable browser plugins' checkbox

    This patch also removes the 'extensions.torbutton.no_tor_plugin'
    pref and simply uses the 'plugin.disable' pref instead.
    
    Thanks to our patch for Bug 10280 in tor-browser.git,
    buttons on the plugins section of about:addons
    already let you "Enable plugins" and "Disable plugins"
    (i.e., toggle the 'plugin.disable' pref).
    
    Also it's probably better to remove this footgun in the UI.
    arthuredelstein committed Oct 14, 2016
  4. Bug 20244.1: Remove "block-disk" checkbox from Privacy & Security Set…

    …tings
    
    An equivalent checkbox, "Always use private browsing mode"
    is already available in about:preferences#privacy. Better to leave
    it more hidden from the user in any case, as it is inadvisable
    to disable private browsing mode.
    
    We remove the 'extensions.torbutton.block_disk' pref and use the
    'browser.privatebrowsing.autostart' pref instead, because they
    are equivalent.
    arthuredelstein committed Oct 14, 2016

Commits on Sep 26, 2016

  1. Bug 20123: Remove code to enable remote jars at low security

    We'll also use add a patch to disable remote jars in tor-browser.git
    arthuredelstein committed Sep 26, 2016
  2. Bug 17904: Allow P&S Settings dialog to resize

    If the dialog is too small to show all descriptions, then the
    descriptions text area will show a scrollbar.
    arthuredelstein authored and gk-tpo committed Sep 26, 2016

Commits on Sep 9, 2016

  1. Translation updates

    gk-tpo committed Sep 9, 2016
  2. Bug 14271: Make Torbutton work with Unix Domain Socket option

    Call Tor Launcher's new TorGetControlSocketFile() function to determine
    if a Unix domain socket is being used for Tor control port communication
    and, if it is, use it instead of a TCP connection.
    Kathy Brade
    Kathy Brade committed Sep 9, 2016

Commits on Sep 8, 2016

  1. Bug 19733: GETINFO response parser doesn't handle AF_UNIX entries.

    When performing the local Tor check (which compares the configured
    Firefox SOCKS proxy to the one reported by GETINFO net/listeners/socks),
    correctly handle UNIX domain sockets as well as IPv6 addresses.
    Kathy Brade
    Kathy Brade committed Sep 8, 2016

Commits on Aug 30, 2016

  1. fixup! Bug 15852: Remove/synchronize Torbutton SOCKS pref logic

    Restore previous behavior: do not reset the SOCKS-related preferences when
    the TOR_SOCKS_HOST and TOR_SOCKS_PORT environment variables are not set.
    Kathy Brade
    Kathy Brade committed Aug 30, 2016

Commits on Aug 26, 2016

  1. Bug 18589: Clear site security settings during New Identity

    We need to clear site security settings (like HSTS) explicitely now
    as they don't belong to the permissions manager anymore.
    gk-tpo committed Aug 26, 2016

Commits on Aug 25, 2016

  1. Bug 15852: Remove/synchronize Torbutton SOCKS pref logic

    Remove the remains of the Torbutton settings panel (which was hidden
    by the fix for bug 14630).
    
    Remove the status bar panel (the status bar was removed in Firefox 4).
    
    Remove the outdated "Disable Torbutton to change these settings"
    message from the Firefox proxy settings dialog.
    
    Change the behavior of the "Restore Defaults" button in the Privacy
    and Security Settings window to no longer reset the browser's proxy
    preferences. Our general philosophy is that if Torbutton does not
    provide a GUI for changing a preference, Torbutton should not modify
    the preference. The exceptions are that Torbutton still supports the
    TOR_SOCKS_PORT and TOR_TRANSPROXY environment variables.
    
    Remove a lot of toggle logic, including extensions.torbutton.tor_enabled
    and related preferences.
    
    Remove the dual cookie jar support since Tor can no longer be turned off.
    
    Rename torbutton_close_on_toggle() to torbutton_close_tabs_on_new_identity().
    
    Remove torbutton_check_socks_remote_dns() since SOCKS remote DNS is
    supported by all modern versions of Firefox.
    
    Remove torbutton_has_good_socks() since it was testing for Firefox 5
    or newer.
    
    Remove unused Firefox version check variables, unused functions, and
    commented out code.
    Kathy Brade
    Kathy Brade committed Aug 25, 2016

Commits on Aug 19, 2016

  1. Bug 19837: Whitelist internal URLs that Firefox requires for media.

    Firefox requires being able to load chrome:// and resource:// URLs for
    things like the media player, with the origin set to the remote URL
    that triggered the load.
    
    This is unfortunate in that there's no way to disambiguate malicious JS
    versus someone opening a video file (for example).
    
    See https://trac.torproject.org/projects/tor/ticket/19837#comment:5
    for why this is a huge nightmare and will eventually require C++ code.
    Yawning authored and gk-tpo committed Aug 19, 2016

Commits on Aug 12, 2016

  1. Bug 19906: "Maximizing Tor Browser" Notification can exist multiple t…

    …imes
    
    Do not add another notification if one is already visible.
    Kathy Brade
    Kathy Brade committed Aug 12, 2016

Commits on Jul 29, 2016

  1. Release preparations for 1.9.6.1

    CHANGELOG update, version bump
    mikeperry-tor committed Jul 29, 2016

Commits on Jul 17, 2016

  1. fixup! Bug 19273: Avoid JavaScript patching of the external app helpe…

    …r dialog.
    
    Remove remaining things needed for fixing #9901.
    gk-tpo committed Jul 17, 2016
  2. Bug 19273: Avoid JavaScript patching of the external app helper dialog.

    Display the external app confirmation dialog in response to the new
    "external-app-requested" observer service notification. Remove
    messy overrides of Mozilla components and console log filtering.
    
    Remove obsolete "on-modify-drag-list" observer and pre-Firefox 4.0
    module registration code from the External App Handler component.
    Kathy Brade authored and gk-tpo committed Jul 17, 2016
Older