1. 15 Sep, 2016 3 commits
  2. 12 Sep, 2016 1 commit
  3. 09 Sep, 2016 4 commits
  4. 08 Sep, 2016 1 commit
  5. 30 Aug, 2016 1 commit
  6. 26 Aug, 2016 1 commit
  7. 25 Aug, 2016 1 commit
    • Kathleen Brade's avatar
      Bug 15852: Remove/synchronize Torbutton SOCKS pref logic · 1b41636c
      Kathleen Brade authored
      Remove the remains of the Torbutton settings panel (which was hidden
      by the fix for bug 14630).
      
      Remove the status bar panel (the status bar was removed in Firefox 4).
      
      Remove the outdated "Disable Torbutton to change these settings"
      message from the Firefox proxy settings dialog.
      
      Change the behavior of the "Restore Defaults" button in the Privacy
      and Security Settings window to no longer reset the browser's proxy
      preferences. Our general philosophy is that if Torbutton does not
      provide a GUI for changing a preference, Torbutton should not modify
      the preference. The exceptions are that Torbutton still supports the
      TOR_SOCKS_PORT and TOR_TRANSPROXY environment variables.
      
      Remove a lot of toggle logic, including extensions.torbutton.tor_enabled
      and related preferences.
      
      Remove the dual cookie jar support since Tor can no longer be turned off.
      
      Rename torbutton_close_on_toggle() to torbutton_close_tabs_on_new_identity().
      
      Remove torbutton_check_socks_remote_dns() since SOCKS remote DNS is
      supported by all modern versions of Firefox.
      
      Remove torbutton_has_good_socks() since it was testing for Firefox 5
      or newer.
      
      Remove unused Firefox version check variables, unused functions, and
      commented out code.
      1b41636c
  8. 19 Aug, 2016 1 commit
  9. 12 Aug, 2016 1 commit
  10. 29 Jul, 2016 1 commit
  11. 28 Jul, 2016 1 commit
  12. 17 Jul, 2016 4 commits
  13. 16 Jul, 2016 1 commit
    • Yawning Angel's avatar
      Bug 8725: Consistently deny redirects to browser/addon internal URLs. · fa67687d
      Yawning Angel authored
      The browser's behavior is different depending on if a given internal
      resource is available or not, regardless of the fact that the actual
      body will not load due to the various safeguards and checks.
      
      This normalizes the behavior by denying all redirects destined for URLs
      with proscribed browser internal schemes (`resource`, `about`, `chrome`).
      fa67687d
  14. 17 Jun, 2016 3 commits
  15. 10 Jun, 2016 2 commits
    • Yawning Angel's avatar
      Bug 19206: Clear out the domain isolator state on `New Identity`. · 36d84929
      Yawning Angel authored and Georg Koppen's avatar Georg Koppen committed
      Additionally clear out the domain isolator state on `New Identity`.  In
      theory this removes the need to explicitly issue a `NEWNYM` as new
      circuits will be used for all subsequent requests, including those made
      via the catch-all circuit.
      36d84929
    • Yawning Angel's avatar
      Bug 19206: Include a 128 bit random tag as part of the domain isolator nonce. · 0fbd44f0
      Yawning Angel authored and Georg Koppen's avatar Georg Koppen committed
      When creating a domain isolation nonce, 128 bits of entropy is drawn
      from a cryptographic source and saved on a per-domain basis.  The new
      circuit behavior is changed to regenerate the nonce, instead of
      incrementing a counter.
      
      This allows the "right thing" to happen when the same tor instance is
      used across multiple Tor Browser sessions, for example when using a
      system wide tor, or a magic anonymity box.
      0fbd44f0
  16. 04 Jun, 2016 1 commit
  17. 31 May, 2016 3 commits
  18. 24 May, 2016 1 commit
  19. 16 May, 2016 1 commit
  20. 09 May, 2016 1 commit
  21. 04 May, 2016 1 commit
  22. 22 Apr, 2016 2 commits
  23. 07 Apr, 2016 3 commits
  24. 19 Mar, 2016 1 commit