Skip to content
Snippets Groups Projects
  1. Feb 22, 2023
  2. Feb 09, 2023
    • Pier Angelo Vendrame's avatar
      Bug 40458: Implement .tor.onion aliases · 02350b7e
      Pier Angelo Vendrame authored
      We have enabled HTTPS-Only mode, therefore we do not need
      HTTPS-Everywhere anymore.
      However, we want to keep supporting .tor.onion aliases (especially for
      securedrop).
      Therefore, in this patch we implemented the parsing of HTTPS-Everywhere
      rulesets, and the redirect of .tor.onion domains.
      Actually, Tor Browser believes they are actual domains. We change them
      on the fly on the SOCKS proxy requests to resolve the domain, and on
      the code that verifies HTTPS certificates.
      02350b7e
    • Kathleen Brade's avatar
      Bug 30237: Add v3 onion services client authentication prompt · 27705d22
      Kathleen Brade authored and Pier Angelo Vendrame's avatar Pier Angelo Vendrame committed
      When Tor informs the browser that client authentication is needed,
      temporarily load about:blank instead of about:neterror and prompt
      for the user's key.
      
      If a correctly formatted key is entered, use Tor's ONION_CLIENT_AUTH_ADD
      control port command to add the key (via Torbutton's control port
      module) and reload the page.
      
      If the user cancels the prompt, display the standard about:neterror
      "Unable to connect" page. This requires a small change to
      browser/actors/NetErrorChild.jsm to account for the fact that the
      docShell no longer has the failedChannel information. The failedChannel
      is used to extract TLS-related error info, which is not applicable
      in the case of a canceled .onion authentication prompt.
      
      Add a leaveOpen option to PopupNotifications.show so we can display
      error messages within the popup notification doorhanger without
      closing the prompt.
      
      Add support for onion services strings to the TorStrings module.
      
      Add support for Tor extended SOCKS errors (Tor proposal 304) to the
      socket transport and SOCKS layers. Improved display of all of these
      errors will be implemented as part of bug 30025.
      
      Also fixes bug 19757:
       Add a "Remember this key" checkbox to the client auth prompt.
      
       Add an "Onion Services Authentication" section within the
       about:preferences "Privacy & Security section" to allow
       viewing and removal of v3 onion client auth keys that have
       been stored on disk.
      
      Also fixes bug 19251: use enhanced error pages for onion service errors.
      27705d22
  3. Feb 08, 2023
  4. Feb 05, 2023
  5. Jan 31, 2023
  6. Feb 02, 2023
  7. Jan 30, 2023
  8. Jan 26, 2023
  9. Jan 23, 2023
  10. Jan 03, 2023
  11. Dec 27, 2022
  12. Oct 27, 2022
  13. Dec 12, 2022
  14. Dec 01, 2022
  15. Nov 24, 2022
  16. Nov 28, 2022
  17. Nov 24, 2022
  18. Sep 14, 2022
  19. Nov 24, 2022
  20. Nov 18, 2022
  21. Nov 04, 2022
  22. Nov 17, 2022
  23. Nov 07, 2022
  24. Oct 27, 2022
  25. Oct 19, 2022
  26. Nov 03, 2022
  27. Nov 02, 2022
  28. Oct 31, 2022
  29. Oct 24, 2022
  30. Oct 18, 2022
  31. Oct 11, 2022
    • Eden Chuang's avatar
      Bug 1658869 - Propagate the InterceptedHttpChannel information to fetch's... · 566f5b90
      Eden Chuang authored
      Bug 1658869 - Propagate the InterceptedHttpChannel information to fetch's channel casued by FetchEvent.request. r=dom-worker-reviewers,dragana,jesup, a=dmeehan
      
      
      When a network load needs to be intercepted by ServiceWorker, we extract the Request from the InterceptedHttpChannel, and propagate the Request through FetchEvent.request.
      
      However, some needed information is not extracted or is modified during the Request propagation, so getting the wrong result when using the Request to fetch resources in the ServiceWorker script.
      
      Differential Revision: https://phabricator.services.mozilla.com/D145969
      566f5b90
  32. Oct 17, 2022
  33. Oct 06, 2022
  34. Sep 29, 2022
Loading