- 15 Sep, 2020 9 commits
-
-
This is technically an embargoed Mozilla bug, so I probably shouldn't provide too many details. Suffice to say that NTLM and Negotiate auth are bad for Tor users, and I doubt very many (or any of them) actually need it. The Mozilla bug is https://bugzilla.mozilla.org/show_bug.cgi?id=1046421
-
We cannot use the @mozilla.org/extensions/blocklist;1 service, because we actually want to stop plugins from ever entering the browser's process space and/or executing code (for example, AV plugins that collect statistics/analyse urls, magical toolbars that phone home or "help" the user, skype buttons that ruin our day, and censorship filters). Hence we rolled our own. See https://trac.torproject.org/projects/tor/ticket/3547#comment:6 for musings on a better way. Until then, it is delta-darwinism for us.
-
Alex Catarineu authored
-
Alex Catarineu authored
Because of the non-restartless nature of Torbutton, it required a two-stage installation process. On mobile, it was a problem, because it was not loading when the user opened the browser for the first time. Moving it to tor-browser and making it a system extension allows it to load when the user opens the browser for first time. Additionally, this patch also fixes Bug 27611. Bug 26321: New Circuit and New Identity menu items Bug 14392: Make about:tor behave like other initial pages. Bug 25013: Add torbutton as a tor-browser submodule
-
Alex Catarineu authored
-
Build and package Tor Launcher as part of the browser (similar to how pdfjs is handled). If a Tor Launcher extension is present in the user's profile, it is removed.
-
Regression tests for Bug #2950: Make Permissions Manager memory-only Regression tests for TB4: Tor Browser's Firefox preference overrides. Note: many more functional tests could be made here Regression tests for #2874: Block Components.interfaces from content Bug 18923: Add a script to run all Tor Browser specific tests Regression tests for Bug #16441: Suppress "Reset Tor Browser" prompt.
-
This hack directly includes our preference changes in omni.ja. Bug 18292: Staged updates fail on Windows Temporarily disable staged updates on Windows. Bug 18297: Use separate Noto JP,KR,SC,TC fonts Bug 23404: Add Noto Sans Buginese to the macOS whitelist Bug 23745: Set dom.indexedDB.enabled = true Bug 13575: Disable randomised Firefox HTTP cache decay user tests. (Fernando Fernandez Mancera <ffmancera@riseup.net>) Bug 17252: Enable session identifiers with FPI Session tickets and session identifiers were isolated by OriginAttributes, so we can re-enable them by allowing the default value (true) of "security.ssl.disable_session_identifiers". The pref "security.enable_tls_session_tickets" is obsolete (removed in https://bugzilla.mozilla.org/917049) Bug 14952: Enable http/2 and AltSvc In Firefox, SPDY/HTTP2 now uses Origin Attributes for isolation of connections, push streams, origin frames, etc. That means we get first-party isolation provided "privacy.firstparty.isolate" is true. So in this patch, we stop overriding "network.http.spdy.enabled" and "network.http.spdy.enabled.http2". Alternate Services also use Origin Attributes for isolation. So we stop overriding "network.http.altsvc.enabled" and "network.http.altsvc.oe" as well. (All 4 of the abovementioned "network.http.*" prefs adopt Firefox 60ESR's default value of true.) However, we want to disable HTTP/2 push for now, so we set "network.http.spdy.allow-push" to false. "network.http.spdy.enabled.http2draft" was removed in Bug 1132357. "network.http.sped.enabled.v2" was removed in Bug 912550. "network.http.sped.enabled.v3" was removed in Bug 1097944. "network.http.sped.enabled.v3-1" was removed in Bug 1248197. Bug 26114: addons.mozilla.org is not special * Don't expose navigator.mozAddonManager on any site * Don't block NoScript from modifying addons.mozilla.org or other sites Enable ReaderView mode again (#27281). Bug 29916: Make sure enterprise policies are disabled Bug 2874: Block Components.interfaces from content Bug 26146: Spoof HTTP User-Agent header for desktop platforms In Tor Browser 8.0, the OS was revealed in both the HTTP User-Agent header and to JavaScript code via navigator.userAgent. To avoid leaking the OS inside each HTTP request (which many web servers log), always use the Windows 7 OS value in the desktop User-Agent header. We continue to allow access to the actual OS via JavaScript, since doing so improves compatibility with web applications such as GitHub and Google Docs. Bug 12885: Windows Jump Lists fail for Tor Browser Jumplist entries are stored in a binary file in: %APPDATA%\\Microsoft\Windows\Recent\CustomDestinations\ and has a name in the form [a-f0-9]+.customDestinations-ms The hex at the front is unique per app, and is ultimately derived from something called the 'App User Model ID' (AUMID) via some unknown hashing method. The AUMID is provided as a key when programmatically creating, updating, and deleting a jumplist. The default behaviour in firefox is for the installer to define an AUMID for an app, and save it in the registry so that the jumplist data can be removed by the uninstaller. However, the Tor Browser does not set this (or any other) regkey during installation, so this codepath fails and the app's AUMID is left undefined. As a result the app's AUMID ends up being defined by windows, but unknowable by Tor Browser. This unknown AUMID is used to create and modify the jumplist, but the delete API requires that we provide the app's AUMID explicitly. Since we don't know what the AUMID is (since the expected regkey where it is normally stored does not exist) jumplist deletion will fail and we will leave behind a mostly empty customDestinations-ms file. The name of the file is derived from the binary path, so an enterprising person could reverse engineer how that hex name is calculated, and generate the name for Tor Browser's default Desktop installation path to determine whether a person had used Tor Browser in the past. The 'taskbar.grouping.useprofile' option that is enabled by this patch works around this AUMID problem by having firefox.exe create it's own AUMID based on the profile path (rather than looking for a regkey). This way, if a user goes in and enables and disables jumplist entries, the backing store is properly deleted. Unfortunately, all windows users currently have this file lurking in the above mentioned directory and this patch will not remove it since it was created with an unknown AUMID. However, another patch could be written which goes to that directory and deletes any item containing the 'Tor Browser' string. See bug 28996. Bug 31396: Disable indexedDB WebExtension storage backend. Bug 30845: Make sure default themes and other internal extensions are enabled Bug 28896: Enable extensions in private browsing by default Bug 31065: Explicitly allow proxying localhost Bug 31598: Enable letterboxing Disable Presentation API everywhere Bug 21549 - Use Firefox's WASM default pref. It is disabled at safer security levels. Bug 32321: Disable Mozilla's MitM pings Bug 19890: Disable installation of system addons By setting the URL to "" we make sure that already installed system addons get deleted as well. Bug 22548: Firefox downgrades VP9 videos to VP8. On systems where H.264 is not available or no HWA, VP9 is preferred. But in Tor Browser 7.0 all youtube videos are degraded to VP8. This behaviour can be turned off by setting media.benchmark.vp9.threshold to 0. All clients will get better experience and lower traffic, beause TBB doesn't use "Use hardware acceleration when available". Bug 25741 - TBA: Add mobile-override of 000-tor-browser prefs Bug 16441: Suppress "Reset Tor Browser" prompt. Bug 29120: Use the in-memory media cache and increase its maximum size. Bug 33697: use old search config based on list.json Bug 33855: Ensure that site-specific browser mode is disabled. Bug 30682: Disable Intermediate CA Preloading. Bug 40061: Omit the Windows default browser agent from the build
-
Also: Bug #9829.1: new .mozconfig file for the new cross-compiler and ESR24 Changes needed to build Mac in 64bit Bug 10715: Enable Webgl for mingw-w64 again. Disable ICU when cross-compiling; clean-up. Bug 15773: Enable ICU on OS X Bug 15990: Don't build the sandbox with mingw-w64 Bug 12761: Switch to ESR 38 for OS X Updating .mozconfig-asan Bug 12516: Compile hardenend Tor Browser with -fwrapv Bug 18331: Switch to Mozilla's toolchain for building Tor Browser for OS X Bug 17858: Cannot create incremental MARs for hardened builds. Define HOST_CFLAGS, etc. to avoid compiling programs such as mbsdiff (which is part of mar-tools and is not distributed to end-users) with ASan. Bug 13419: Add back ICU for Windows Bug 21239: Use GTK2 for ESR52 Linux builds Bug 23025: Add hardening flags for macOS Bug 24478: Enable debug assertions and tests in our ASan builds --enable-proxy-bypass-protection Bug 27597: ASan build option in tor-browser-build is broken Bug 27623 - Export MOZILLA_OFFICIAL during desktop builds This fixes a problem where some preferences had the wrong default value. Also see bug 27472 where we made a similar fix for Android. Bug 30463: Explicitly disable MOZ_TELEMETRY_REPORTING Bug 31450: Set proper BINDGEN_CFLAGS for ASan builds Add an --enable-tor-browser-data-outside-app-dir configure option Add --with-tor-browser-version configure option Bug 21849: Don't allow SSL key logging. Bug 31457: disable per-installation profiles The dedicated profiles (per-installation) feature does not interact well with our bundled profiles on Linux and Windows, and it also causes multiple profiles to be created on macOS under TorBrowser-Data. Bug 31935: Disable profile downgrade protection. Since Tor Browser does not support more than one profile, disable the prompt and associated code that offers to create one when a version downgrade situation is detected. Bug 32493: Disable MOZ_SERVICES_HEALTHREPORT Bug 25741 - TBA: Disable features at compile-time MOZ_NATIVE_DEVICES for casting and the media player MOZ_TELEMETRY_REPORTING for telemetry MOZ_DATA_REPORTING for all data reporting preferences (crashreport, telemetry, geo) Bug 25741 - TBA: Add default configure options in dedicated file Define MOZ_ANDROID_NETWORK_STATE and MOZ_ANDROID_LOCATION Bug 29859: Disable HLS support for now Add --disable-tor-launcher build option Add --enable-tor-browser-update build option Bug 33734: Set MOZ_NORMANDY to False Bug 33851: Omit Parental Controls. Bug 40061: Omit the Windows default browser agent from the build
-
- 10 Sep, 2020 2 commits
-
-
Dão Gottwald authored
Differential Revision: https://phabricator.services.mozilla.com/D89750
-
Dão Gottwald authored
Bug 1656508 - Fix blocking of default top sites with %YYYYMMDDHH% in their URL. r=mikedeboer, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D89729
-
- 07 Sep, 2020 1 commit
-
-
valenting authored
Differential Revision: https://phabricator.services.mozilla.com/D89374
-
- 10 Sep, 2020 2 commits
-
-
Mozilla Releng Treescript authored
hsb -> 2317419e82b8c8e3776e5dd8dffbde22d893fcd8 it -> 7bc3e0bd3fdec27cb37f4b4cd5b0d250894ae859
-
Ryan Hunt authored
wasm::ToCString() couldn't OOM, but wasm::ToString() can, so the all the use cases need to check for OOM and propagate it. Differential Revision: https://phabricator.services.mozilla.com/D89671
-
- 01 Sep, 2020 1 commit
-
-
Marco Bonardo authored
Differential Revision: https://phabricator.services.mozilla.com/D89143
-
- 09 Sep, 2020 2 commits
-
-
Henrik Skupin authored
TimedPromise logs a warning if the timeout exceeded and not error should be raised. Given that Sleep always runs into that condition a lot of inappropriate log entries are made that also causes confusion for our users when commands (especially actions) don't work as expected. Differential Revision: https://phabricator.services.mozilla.com/D89354
-
Erica Wright authored
Differential Revision: https://phabricator.services.mozilla.com/D89478
-
- 02 Sep, 2020 1 commit
-
-
Chris H-C authored
Differential Revision: https://phabricator.services.mozilla.com/D89023
-
- 07 Sep, 2020 1 commit
-
-
Henrik Skupin authored
Bug 1663429 - [marionette] Only throw NoSuchWindow error in "WebDriver:SwitchToWindow". r=jgraham, a=RyanVM There is a race condition in the "WebDriver:SwitchToWindow" command that would throw an UnknownError instead of NoSuchWindowError when the window gets closed at the same time as the command gets called. Differential Revision: https://phabricator.services.mozilla.com/D89377
-
- 10 Sep, 2020 1 commit
-
-
ffxbld authored
Differential Revision: https://phabricator.services.mozilla.com/D89795
-
- 08 Sep, 2020 2 commits
-
-
Emma Malysz authored
Bug 1662183, hide fxa button from main menu when identity.fxaccounts.enabled is false r=Gijs,mkaply a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D88946
-
Emilio Cobos Alvarez authored
This shouldn't generally happen, but seems it can under some circumstances and even though I've fixed the error condition that triggers this a null-check here is harmless. Differential Revision: https://phabricator.services.mozilla.com/D89453
-
- 01 Sep, 2020 1 commit
-
-
Miko Mynttinen authored
Differential Revision: https://phabricator.services.mozilla.com/D89006
-
- 09 Sep, 2020 3 commits
-
-
Agi Sferro authored
When restoring state into a new session, the actor gets recreated after navigating away from `about:blank` so we have to query for it again to get the right instance. Differential Revision: https://phabricator.services.mozilla.com/D89475
-
Agi Sferro authored
Differential Revision: https://phabricator.services.mozilla.com/D89474
-
Ryan VanderMeulen authored
This is a cherry-pick of the following upstream commits: https://github.com/mozilla/pdf.js/pull/12344 https://github.com/mozilla/pdf.js/pull/12345 Differential Revision: https://phabricator.services.mozilla.com/D89538
-
- 10 Sep, 2020 7 commits
-
-
Mozilla Releng Treescript authored
hsb -> 508a8405f392a9bc5d4272bbaa75e9b406d5fcf2
-
Mozilla Releng Treescript authored
sl -> ddd233301813324df946e46d8cedac5725f13c03
-
Mozilla Releng Treescript authored
my -> db698a43e55ea9999f8e913c45401afbdad3bb0d
-
Mozilla Releng Treescript authored
my -> 0f4f818326f045ac52e2655e81b81433060ab6bb vi -> 58013b4512078104cdc5e2af3468b6ddfd9bee07
-
Mozilla Releng Treescript authored
my -> bc57fe46054e9e5739da3e1f15cb6fb486d41a16 vi -> b606feb3eb4c2b177ff25f7a3250b54f01ef8c8f
-
Mozilla Releng Treescript authored
an -> bef2d2227665330824b74dfa1c605b72391bc537
-
Mozilla Releng Treescript authored
an -> f517d255d09b423ddd618199d2a2d53c03c83069
-
- 25 Aug, 2020 1 commit
-
-
Andreea Pavel authored
Bug 1642532 - Update k-rate-dynamics-compressor-connections.html expectation on linux 32 r=jmaher a=test-only DONTBUILD Differential Revision: https://phabricator.services.mozilla.com/D87945
-
- 09 Sep, 2020 3 commits
-
-
Mozilla Releng Treescript authored
hsb -> cda6e8c0d4c41996cd563b31da8aa430bf1dcc8f
-
Mozilla Releng Treescript authored
hsb -> f0fd97878c8fd6f67e5e18c38c7d2cebf51a9ecf
-
Jonathan Kew authored
Bug 1659527 - Back out changeset 66856ed017c9 (bug 1662820) for regressing scaling in Save as PDF output. r=jwatt, a=RyanVM Differential Revision: https://phabricator.services.mozilla.com/D89607
-
- 08 Sep, 2020 1 commit
-
-
Andrew McCreight authored
Under unknown circumstances, we can end up running chrome JS during thread manager shutdown. Sometimes this ends up trying to load new JSMs, but gJarHandler has already been cleared, leading to a crash. To avoid this and other issues, this patch forbids the importing of new JSMs after we're late enough in shutdown to have cleared the ClearOnShutdown pointers. I allow the importing of JSMs that have already been loaded, as that seems like it should be okay. Differential Revision: https://phabricator.services.mozilla.com/D89477
-
- 07 Sep, 2020 1 commit
-
-
Kagami Sascha Rosylight authored
Differential Revision: https://phabricator.services.mozilla.com/D89218
-
- 05 Sep, 2020 1 commit
-
-
Steven Michaud authored
Differential Revision: https://phabricator.services.mozilla.com/D89245
-