Skip to content
  1. Mar 08, 2018
    • Georg Koppen's avatar
    • richard's avatar
      Bug 25147: Sanitize HTML fragments created for chrome-privileged documents · 3eb8f10e
      richard authored and Georg Koppen's avatar Georg Koppen committed
      Ported over firefox patch c2db4a50dc5c (Bug 1432966)
      3eb8f10e
    • richard's avatar
      Bug 25112: Tor Browser 7.5 is not working on Windows Vista 64bit · 0b48ad93
      richard authored and Georg Koppen's avatar Georg Koppen committed
      With sandboxing enabled on Vista, 32-bit Firefox uses another 64-bit
      process (wow_helper.exe) to patch functions in the loaded ntdll.dll
      in the child content process.  However, we are not building
      wow_helper.exe and it is not present, so the content process
      creation method silently fails.
      
      We 'could' go in and properly update the build system to build
      wow_helper.exe with 64-bit mingw.  However, Vista support is going
      away very soon for Tor Browser once we update to a newer Firefox ESR.
      Therefore, the more prudent fix is to simply disable sandboxing when
      running on Vista or lower in this WOW64 scenario, rather than to do
      the work to get wow_helper.exe building only to have to rip it all
      out in a few months when we rebase with latest Firefox ESR.  This
      logic is ifdef'd out for 64-bit builds.
      
      Verified the Tor Browser works as expected in following scenarios:
        32-bit Firefox on 32-bit Windows Vista -> Sandbox enabled
        32-bit Firefox on 64-bit Windows Vista -> Sandbox disabled
        32-bit Firefox on 64-bit Windows 7 -> Sandbox enabled
      0b48ad93
  2. Mar 01, 2018
    • Kris Maglione's avatar
      Bug 1370027: Part 1 - Cleanly handle a subprocess child being reaped by NSPR. r=aswan · f7e0d580
      Kris Maglione authored and Georg Koppen's avatar Georg Koppen committed
      The first time any other code in the parent process uses NSPR (usually via
      nsIProcess) to spawn a new process, it spawns a thread to contuously wait for
      any child process to exit. This thread winds up reaping our child processes
      before we get the chance to wait for them, which leads us to continuously poll
      for them to exit.
      
      We don't have a good way to handle this, but checking the error status of
      waitpid at least prevents us from failing catastrophically.
      
      MozReview-Commit-ID: 75Z1yUHUmjy
      
      --HG--
      extra : rebase_source : db45f781190b6fc84873c32c611134326736a1ba
      
      This closes our bug 25389.
      f7e0d580
  3. Feb 20, 2018
  4. Feb 19, 2018
    • richard's avatar
      Bug 22794: Don't open AF_INET/AF_INET6 sockets when AF_LOCAL is configured · eafaa94a
      richard authored and Georg Koppen's avatar Georg Koppen committed
      The initialization path for the SOCKS proxy in firefox involves creating
      a generic AF_INET socket, and then replacing it if the actual
      configuration requires something else (either AF_INET6 or AF_LOCAL).
      With syscall filtering configured to return an error in the event of
      AF_INET or AF_INET6 socket creation, this initialization path fails.  We
      would like this capability so that we can prevent firefox from making
      network requests outside of the Tor proxy.
      
      This patch adds a check in the initial socket creation path to see if
      the SOCKS proxy host begins with file:// with the assumption that such
      URIs point to a UNIX Domain Socket (on Linux+macOS only).  In that case,
      we create an AF_LOCAL socket rather than the requested type.  A similar
      check for Windows already exists to determine if the proxy is actually a
      named pipe.
      
      In the subsequent replacing step no work occurs as the passed in socket
      matches the type we need, so no changes need to be made there.
      
      NOTE: With this change there is still a one-time request for an AF_INET6
      socket that occurs.  This code path exists to determine whether the
      system supports IPv6; if socket(AF_INET6...) fails then it is assumed
      that the system does not.  However, this check only affects code that is
      unreachable when using AF_LOCAL sockets so it seems safe to leave as it is.
      However, this does mean that Tor Browser will still be incompatible with
      seccomp policies which kill the calling thread in the event of a
      socket(AF_INET6,...) call.
      eafaa94a
    • Kathleen Brade's avatar
      Bug 19910: Rip out optimistic data socks handshake variant (#3875) · 67fa1e52
      Kathleen Brade authored and Georg Koppen's avatar Georg Koppen committed
      This has been shown to cause problems with STARTTLS in XMPP (used
      in Tor Messenger) and with Tor Launcher's Moat client. A replacement
      will be added to the Tor daemon itself via bug 5915 (Write patch to
      make socks handshakes succeed instantly).
      67fa1e52
    • ffmancera's avatar
      Bug 22614: Make e10s/non-e10s Tor Browsers indistinguishable · a91cf5fa
      ffmancera authored and Georg Koppen's avatar Georg Koppen committed
      e10s in its current form probably brings some fingerprinting risks with it.
      E.g. users of accessibility tools (not only those users) won't have e10s
      enabled on windows and macOS. In order to solve this issue
      "dom.disable_window_showModalDialog" is set to "true".
      a91cf5fa
    • Zibi Braniecki's avatar
      Bug 1005640 - Flush StringBundle cache when app-locales change. r=valentin · 0445d514
      Zibi Braniecki authored and Georg Koppen's avatar Georg Koppen committed
      StringBundle caches bundles, so when language chain changes we should
      flush the cache to enable new strings to be loaded.
      This also affects localized prefs like intl.accept_languages.
      
      Then in HttpHandler we have to mark the value as dirty so that next
      time it's called it actually recalculates using flushed string bundle
      with the new locale.
      
      MozReview-Commit-ID: DKWEDUli4yH
      
      --HG--
      extra : rebase_source : 75ecc4204deca066d7492d1494492a91685f36be
      
      This fixes bug 22659 on our side.
      0445d514
  5. Feb 02, 2018
    • ffmancera's avatar
      Bug 13575: Disable randomised Firefox HTTP cache decay user tests. · f6d6512b
      ffmancera authored and Georg Koppen's avatar Georg Koppen committed
      Mozilla's experiment shouldn't be collecting any data on our users. If
      "browser.cache.frecency_experiment" is not set in firefox.js to "-1" it will
      default to "0" and then it is randomised between "1" and "4" inclusive, setting
      different HTTP cache decay times for the four groups.
      f6d6512b
  6. Jan 19, 2018