summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* Make it clear the project is unmaintained. (No functional changes).HEADmasterYawning Angel2018-06-17
|
* fixup! Bug 25154: Fix a content process crash on JS heavy pages.Yawning Angel2018-03-23
|
* Bug 25154: Fix a content process crash on JS heavy pages.Yawning Angel2018-03-23
| | | | | This fixes ln5's test case. Couldn't reproduce arma's, but I'll admit I didn't try very hard since the other page was consistently crashing.
* fixup! dynlib: Search the system library path(s) as the last resort.Yawning Angel2018-03-23
|
* dynlib: Search the system library path(s) as the last resort.Yawning Angel2018-02-20
| | | | | This make the dynlib process more resilient to ld.so.conf having oddities in it, and more importantly makes this work on my laptop again.
* Bump the version to 0.0.17-dev.Yawning Angel2017-11-24
|
* Do the release ritual for sandboxed-tor-browser-0.0.16.sandboxed-tor-browser-0.0.16Yawning Angel2017-11-24
|
* Bug 24171: Create the `Caches` directory properly.Yawning Angel2017-11-08
|
* Bump the version to 0.0.16-dev.Yawning Angel2017-10-30
|
* Do the release ritual for sandboxed-tor-browser-0.0.15.sandboxed-tor-browser-0.0.15Yawning Angel2017-10-30
|
* Merge branch 'bug23943'Yawning Angel2017-10-30
|\
| * Bug 23943: obfs4proxy crashes on certain systems.Yawning Angel2017-10-22
| | | | | | | | | | | | Depending on something that's system specific (recent Ewwbuntu, Arch, but not F26), obfs4proxy calls mmap slightly differently, and dies because the call is getting `ENOSYS`ed by seccomp.
* | Bug 23166: Add Felix's obfs4 bridges to the built-in bridges.Yawning Angel2017-10-30
| | | | | | | | https://gitweb.torproject.org/builders/tor-browser-build.git/commit/projects/tor-browser/Bundle-Data/PTConfigs/bridge_prefs.js?id=5eb4c84fd87c80496dc522f44f26928f1330b814
* | Disable the 2017 donation campaign banner.Yawning Angel2017-10-25
|/
* Bug 23915: 7.0.7 and later fails to work without `SECCOMP_FILTER_FLAG_TSYNC`.Yawning Angel2017-10-20
| | | | | | | This is more fallout from #20773, that only manifests on systems running kernels that pre-date 3.17 (Debian oldstable). The "better" fix might be to only engage the workaround if `SECCOMP_FILTER_FLAG_TSYNC` isn't supported.
* Bump the version to 0.0.15-dev.Yawning Angel2017-09-29
|
* Do the release ritual for sandboxed-tor-browser-0.0.14.sandboxed-tor-browser-0.0.14Yawning Angel2017-09-29
|
* Bug 23692: Add PR_SET_NO_NEW_PRIVS as an allowed prctl() operation.Yawning Angel2017-09-29
| | | | | | | | | Apparently tabs crash without this in 7.5a5, and according to the report this is the first thing it complains about before crashing deep in IPC land. At a minimum this shuts the error up, and a fresh install appears to work...
* Bug 22814: Revert the upstream fix by default.Yawning Angel2017-09-20
| | | | | I don't care what the people whining on trac or bugzilla say, I like the existing behavior, so I'll flip the pref now to keep it.
* Bug 8706: Fully disable the .recently-used.xbel.Yawning Angel2017-09-19
| | | | | | It's essentially mostly harmless since even if a file is created, it won't be persisted, but the browser shouldn't be keeping track of recently used files to begin with.
* Bump the version to 0.0.14-dev.Yawning Angel2017-09-13
|
* Do the release ritual for sandboxed-tor-browser-0.0.13.sandboxed-tor-browser-0.0.13Yawning Angel2017-09-13
|
* Bug 23449: Allow `epool_pwait` in the tor seccomp rules.Yawning Angel2017-09-10
|
* Update the stub's comment blurb. (No functional changes)Yawning Angel2017-08-31
|
* Use the GCC constructor attribute for stub initialization.Yawning Angel2017-08-31
| | | | Non-portable but this is cleaner.
* Revert "Force disable `navigator.sendBeacon()`."Yawning Angel2017-08-30
| | | | | | | | This reverts commit 8ccea0137d87d049c0f09ece7428942af78b7570. I need to think about this more. While I still think the call is basically only used to make tracking people easier, if mainline Tor Browser doesn't disable it, this will impact the user anonymity set.
* Disable the "Open with" dialog, which will never work.Yawning Angel2017-08-28
| | | | | | The container doesn't have anything to "Open with", nor does it have D-Bus access. Neither of these things will change, so the dialog can be suppressed.
* Force disable `navigator.sendBeacon()`.Yawning Angel2017-08-26
| | | | | Why Tor Browser doesn't do this, I have no idea, but it's basically part of the cancer that is killing the internet.
* Unset the addon autoupdater URL prefs.Yawning Angel2017-08-17
| | | | | | | | | | Updating addons is disabled by default and will not work, even though it may appear to (#23265). Instead of checking and then failing to apply the update, by removing the URLs from the prefs, the check will fail immediately. This applies to everything but HTTPSE, because HTTPSE provides it's own updateURL in the install.rdf file.
* fixup! Bug 22984: Force IDNs to be displayed as punycode to thwart homograph ↵Yawning Angel2017-08-03
| | | | attacks.
* Bug 13170: Disable the rest of the Firefox experiments botnet prefs.Yawning Angel2017-08-03
| | | | The Tor Browser developers have not took action on this, so I will.
* Bump the version to 0.0.13-dev.Yawning Angel2017-08-01
|
* Do the release ritual for sandboxed-tor-browser-0.0.12.sandboxed-tor-browser-0.0.12Yawning Angel2017-08-01
|
* Bug 23058: Apply the SelfRando workaround to 7.5a3 as well.Yawning Angel2017-07-28
| | | | | The browser people apparently didn't update SelfRando, so the workaround for the syscall stupiditiy is still needed.
* Default disable `dom.securecontext.whitelist_onions`.Yawning Angel2017-07-24
| | | | Honestly, bluring the line between CA signed HTTPS and onions is terrible.
* Fix my failure at spelling/formatting in the ChangeLog (No functional changes).Yawning Angel2017-07-19
|
* Bug 22967: Force disable crashdump reporting.Yawning Angel2017-07-19
| | | | | Since crashdumps are developed as a GSOC project, ensure that if/when this makes it to production, that it will be force disabled.
* Bug 22984: Force IDNs to be displayed as punycode to thwart homograph attacks.Yawning Angel2017-07-19
| | | | | Since no action is being taken by either upstream, unilaterally fix this.
* Bug 22969: Disable the addon blocklist.Yawning Angel2017-07-18
| | | | | | Leaking information to Mozilla is bad, the container setup takes step not to allow non-standard extensions, and it's totally unsupported anyway.
* Bump the version to 0.0.12-dev.Yawning Angel2017-07-18
|
* Do the release ritual for sandboxed-tor-browser-0.0.11.sandboxed-tor-browser-0.0.11Yawning Angel2017-07-18
|
* fixup! Bug 22932: Add experimental Amensiac Profile Directory support.Yawning Angel2017-07-16
| | | | Fix some comments, no functional changes.
* Bug 22932: Add experimental Amensiac Profile Directory support.Yawning Angel2017-07-16
| | | | | | | | | | | This is currently an advanced config option as it is still experimental and needs more testing. When enabled it will copy the Firefox profile directory into a tmpfs mount when the container is created, that is discarded when the container is torn down. The following directories are read-only bind mounted as usual: * profile.default/preferences * profile.default/extensions
* Bug 22910: Deprecate the volatile extension dir option.Yawning Angel2017-07-14
| | | | | | Foot + gun options are bad, the "Get Addons" pane is force disabled via a locked pref by virtue of being Mozilla + Google botnet bullshit, and this commit also switches to an extension whitelist.
* Bug 22899: Force disable the "Get Addons" pane via a pref.Yawning Angel2017-07-14
| | | | | This seems to be the solution that the Tor Browser devs are going for, which is sensible.
* Bump the version to 0.0.11-dev.Yawning Angel2017-07-12
|
* Do the release ritual for sandboxed-tor-browser-0.0.10.sandboxed-tor-browser-0.0.10Yawning Angel2017-07-12
|
* Bug 22899: `about:addons`'s "Get Addons" pane is unsafe and should be ↵Yawning Angel2017-07-12
| | | | | | | | treated as such. Loading Google Analytics as part of an IFRAME that implements an internal `about:` URL, without being explicitly opt-in is the total antithesis of privacy respecting.
* Bug 22901: Clarify/expand on the warnings for all the config settings.Yawning Angel2017-07-12
| | | | | I should have done this to begin with, and part of me wants to deprecate all of these options entirely, but people will complain.
* fixup! Bug 22853: Something in Ubuntu's libraries is totally brain damaged.Yawning Angel2017-07-08
| | | | | | Only enable the workaround for the alpha series, and only if the version is 7.5a2 or older, on the assumption that since it's fixed upstream it will be reflected in the next Tor Browser alpha build.