[tor-commits] [torbutton/master] Clear out old Firefox bugs.
mikeperry at torproject.org
mikeperry at torproject.org
Tue Apr 5 00:36:40 UTC 2011
commit 045097194dece98b3c8df732531b0f303cf2ab72
Author: Mike Perry <mikeperry-git at fscked.org>
Date: Mon Apr 4 17:10:24 2011 -0700
Clear out old Firefox bugs.
Also fix a couple typos found by arma.
---
website/design/design.xml | 21 ++++++++++++++-------
1 files changed, 14 insertions(+), 7 deletions(-)
diff --git a/website/design/design.xml b/website/design/design.xml
index c589de8..4997cfa 100644
--- a/website/design/design.xml
+++ b/website/design/design.xml
@@ -577,10 +577,10 @@ years past.
<title><ulink
url="https://gitweb.torproject.org/torbutton.git/blob_plain/HEAD:/src/components/torRefSpoofer.js">@torproject.org/torRefSpoofer;1</ulink></title>
<para>
-This component handles optional referrer spoofing for Torbuton. It implements a
+This component handles optional referer spoofing for Torbutton. It implements a
form of "smart" referer spoofing using <ulink
url="https://developer.mozilla.org/en/Setting_HTTP_request_headers">http-on-modify-request</ulink>
-to modify the Referrer header. The code sends the default browser referrer
+to modify the Referer header. The code sends the default browser referer
header only if the destination domain is a suffix of the source, or if the
source is a suffix of the destination. Otherwise, it sends no referer. This
strange suffix logic is used as a heuristic: some rare sites on the web block
@@ -2043,7 +2043,7 @@ sent. The default value is 1. The smart referer spoofing is implemented by the
</para>
<para>
This setting also does not directly satisfy any Torbutton requirement, but
-some may desire to mask their referrer for general privacy concerns.
+some may desire to mask their referer for general privacy concerns.
</para>
</sect3>
@@ -2188,7 +2188,7 @@ bug interferes with Torbutton's ability to satisfy its <link
linkend="setpreservation">Anonymity Set Preservation</link> requirement.
</para>
</listitem>
-
+<!--
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=280661">Bug 280661 - SOCKS proxy server
connection timeout hard-coded</ulink>
@@ -2202,6 +2202,7 @@ of privacy and security issues of its own (in addition to being unmaintained).
</para>
</listitem>
+-->
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=418986">Bug 418986 - window.screen
provides a large amount of identifiable information</ulink>
@@ -2284,7 +2285,7 @@ linkend="setpreservation">Anonymity Set Preservation</link> requirement.
</para>
</listitem>
<listitem><ulink
-url="https://bugzilla.mozilla.org/show_bug.cgi?id=122752">SOCKS
+url="https://bugzilla.mozilla.org/show_bug.cgi?id=122752">Bug 122752 - SOCKS
Username/Password Support</ulink>
<para>
We need <ulink url="https://developer.mozilla.org/en/nsIProxyInfo">Firefox
@@ -2334,6 +2335,7 @@ requirement on Firefox 3.
</listitem>
</orderedlist>
</sect2>
+<!-- XXX: Need to create a bug for DOM storage APIs at some point -->
<sect2 id="FirefoxWishlist">
<title>Bugs blocking functionality</title>
<para>
@@ -2342,7 +2344,7 @@ The following bugs impact Torbutton and similar extensions' functionality.
<orderedlist>
-
+<!--
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=445696">Bug 445696 -
Extensions cannot determine if Firefox is full screen</ulink>
@@ -2355,8 +2357,9 @@ to resize maximized and minimized windows when it should not.
</para>
</listitem>
+-->
<listitem><ulink
-url="https://bugzilla.mozilla.org/show_bug.cgi?id=629820">nsIContentPolicy::shouldLoad not
+url="https://bugzilla.mozilla.org/show_bug.cgi?id=629820">Bug 629820 - nsIContentPolicy::shouldLoad not
called for web request in Firefox Mobile</ulink>
<para>
@@ -2371,6 +2374,7 @@ which will also cause more problems for porting Torbutton.
</para>
</listitem>
+<!--
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=290456">Bug 290456 -
Block/clear Flash MX "cookies" as well</ulink>
@@ -2386,6 +2390,7 @@ it would be nice if there was a standard way to do this from a Firefox API.
</para>
</listitem>
+-->
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=417869">Bug 417869 -
Browser context is difficult to obtain from many XPCOM callbacks</ulink>
@@ -2476,6 +2481,7 @@ workarounds.
</para>
<orderedlist>
+<!--
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=435151">Bug 435151 - XPCSafeJSObjectWrapper breaks evalInSandbox</ulink>
<para>
@@ -2490,6 +2496,7 @@ properly though.
</para>
</listitem>
+-->
<listitem><ulink
url="https://bugzilla.mozilla.org/show_bug.cgi?id=440892">Bug 440892 -
network.protocol-handler.warn-external are ignored</ulink>
More information about the tor-commits
mailing list