[tor-bugs] #20685 [Applications/Tor Browser]: Make sure the first party isolation patches in ESR52 behave as they should
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue May 23 15:29:19 UTC 2017
#20685: Make sure the first party isolation patches in ESR52 behave as they should
-------------------------------------------------+-------------------------
Reporter: gk | Owner: gk
Type: task | Status: closed
Priority: High | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution: fixed
Keywords: ff52-esr, TorBrowserTeam201705, | Actual Points:
GeorgKoppen201705, tbb-7.0-must |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by cypherpunks):
Replying to [comment:19 gk]:
> Replying to [comment:17 cypherpunks]:
> > {{{
> > [05-23 14:38:23] Torbutton INFO: tor SOCKS:
https://secure.informaction.com/download/betas/noscript-5.0.4rc3.xpi via
> > --unknown--:0e238a0217adfcd384c6d8f9ccf6bb95
> > }}}
> > is not so big problem, as it is behind a permission prompt and also
ends with
> > {{{
> > 1495550309400 addons.xpi WARN Download of
https://secure.informaction.com/download/betas/noscript-5.0.4rc3.xpi
failed: [Exception... "Certificate issuer is not built-in." nsresult:
"0x80004004 (NS_ERROR_ABORT)" location: "JS frame ::
resource://gre/modules/CertUtils.jsm :: checkCert :: line 171" data: no]
Stack trace: checkCert()@resource://gre/modules/CertUtils.jsm:171 <
onStopRequest()@resource://gre/modules/addons/XPIProvider.jsm:6547
> > }}}
> Extension updates go over the catch-all circuit, yes. This is okay for
now I think.
Even via direct link ;)
Also we hope that those and other "system" catch-all circuits works via
parent process is not a news for you.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20685#comment:20>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list