[tor-bugs] #23439 [Applications/Tor Browser]: Exempt .onion domains from mixed content warnings
Tor Bug Tracker & Wiki
blackhole at torproject.org
Tue Mar 20 19:59:32 UTC 2018
#23439: Exempt .onion domains from mixed content warnings
-------------------------------------------------+-------------------------
Reporter: gk | Owner: gk
Type: defect | Status:
| needs_review
Priority: Medium | Milestone:
Component: Applications/Tor Browser | Version:
Severity: Normal | Resolution:
Keywords: TorBrowserTeam201803R, | Actual Points:
GeorgKoppen201803 |
Parent ID: | Points:
Reviewer: | Sponsor:
-------------------------------------------------+-------------------------
Comment (by mcs):
Replying to [comment:18 arthuredelstein]:
> As a version of these patches have landed in Mozilla, shall we backport
them to include in the next Tor Browser alpha?
I thought of doing this a couple of weeks ago, but I got stuck because the
automated test fails for a strange reason, at least in my non-rbm macOS
build. What happens is that an SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED
error occurs while trying to load
https://example.com/browser/browser/base/content/test/siteIdentity/test_no_mcb_for_onions.html
Manually testing does show that the patch is correct. The main advantage
over the patches from comment:15 is that pref caching is included. You can
find the two commits here:
https://gitweb.torproject.org/user/brade/tor-
browser.git/log/?h=bug23439-01
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23439#comment:21>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list