[tbb-bugs] #28125 [Applications/Tor Browser]: Don't let Android leak DNS queries
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Oct 30 01:44:10 UTC 2018
#28125: Don't let Android leak DNS queries
-------------------------------------------------+-------------------------
Reporter: sysrqb | Owner: tbb-
| team
Type: defect | Status:
| needs_review
Priority: Immediate | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: tbb-mobile, tbb-proxy-bypass, | Actual Points:
TorBrowserTeam201810R |
Parent ID: #5709 | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by igt0):
For all my tests I have been using a real device connected to my computer
and I am using mitmproxy(https://mitmproxy.org/) to debug http(s) protocol
and wireshark for non tls stuff.
**mobile/android/geckoview/src/thirdparty/java/com/google/android/exoplayer2/upstream/DefaultHttpDataSource.java**
Steps:
1. Open https://bitmovin-a.akamaihd.net/content/MI201109210084_1/m3u8s
/f08e80da-bf1d-4e3d-8899-f0f6155f6efa.m3u8 or
https://content.jwplatform.com/manifests/yp34SRmf.m3u8
2. Look for connections to both URLs.
Result: I was not able to verify any connection open for those URLs.
**mobile/android/base/java/org/mozilla/gecko/updater/UpdateService.java**
Test cases:
1. Enabled MOZ_UPDATER
2. Click in the check for updates button
3. Verify if any connection was made to the update URL
Result: No request was made
**mobile/android/base/java/org/mozilla/gecko/CrashReporter.java**
Not able to test.
**mobile/android/geckoview/src/main/java/org/mozilla/gecko/media/GeckoMediaDrmBridgeV21.java**
It is disabled in our prefs and we don't plan to enable soon. So I didn't
test it.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28125#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tbb-bugs
mailing list