summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
...
* Bug 20399: Remove obsolete font attempt prefsArthur Edelstein2016-10-18
|
* Bug 20388: Consolidate Services.prefs referencesArthur Edelstein2016-10-17
|
* Bug 18093: Remove 'Restore Defaults' buttonArthur Edelstein2016-10-17
|
* Bug 20373: Prevent redundant dialogs openingArthur Edelstein2016-10-17
|
* Bug 20244.6: Overlay checkboxes to use torbutton translationsArthur Edelstein2016-10-14
|
* Bug 20244.5: Remove obsolete Privacy Settings groupArthur Edelstein2016-10-14
|
* Bug 20244.4: Remove 'Change details that distinguish you...' checkboxArthur Edelstein2016-10-14
| | | | | | Also, remove the 'extensions.torbutton.resist_fingerprinting' pref and just use the 'privacy.resistFingerprinting' pref instead. We will use this to implement a checkbox in the about:preferences#privacy page.
* Bug 20244.3: Remove 'restrict third party cookies...' checkboxArthur Edelstein2016-10-14
| | | | | | | | | | Also, we remove the 'extensions.torbutton.restrict_thirdparty' and use the 'privacy.thirdparty.isolate' pref. At the same time we will need to add a checkbox to the about:preferences#privacy page that toggles 'privacy.thirdparty.isolate'. Note that 'privacy.thirdparty.isolate' will be renamed to 'privacy.firstparty.isolate' in Firefox 52.
* Bug 20244.2: Remove 'disable browser plugins' checkboxArthur Edelstein2016-10-14
| | | | | | | | | | | | This patch also removes the 'extensions.torbutton.no_tor_plugin' pref and simply uses the 'plugin.disable' pref instead. Thanks to our patch for Bug 10280 in tor-browser.git, buttons on the plugins section of about:addons already let you "Enable plugins" and "Disable plugins" (i.e., toggle the 'plugin.disable' pref). Also it's probably better to remove this footgun in the UI.
* Bug 20244.1: Remove "block-disk" checkbox from Privacy & Security SettingsArthur Edelstein2016-10-14
| | | | | | | | | | | An equivalent checkbox, "Always use private browsing mode" is already available in about:preferences#privacy. Better to leave it more hidden from the user in any case, as it is inadvisable to disable private browsing mode. We remove the 'extensions.torbutton.block_disk' pref and use the 'browser.privatebrowsing.autostart' pref instead, because they are equivalent.
* Bug 20123: Remove code to enable remote jars at low securityarthuredelstein@gmail.com2016-09-26
| | | | We'll also use add a patch to disable remote jars in tor-browser.git
* Bug 17904: Allow P&S Settings dialog to resizearthuredelstein@gmail.com2016-09-26
| | | | | If the dialog is too small to show all descriptions, then the descriptions text area will show a scrollbar.
* Bug 17546: Tooltips for Privacy Settings checkboxesarthuredelstein@gmail.com2016-09-23
|
* Version bump for new tagGeorg Koppen2016-09-15
|
* Release preparations for 1.9.6.3Georg Koppen2016-09-15
|
* Bug 17334: Move referrer spoof for .onion domains to tor-browser.gitArthur Edelstein2016-09-15
|
* Bug 17767: Move 'JavaScript disabled' to top of Security Slider listArthur Edelstein2016-09-12
|
* Adding translation update to CHANGELOGGeorg Koppen2016-09-09
|
* Release preparations for 1.9.6.2Georg Koppen2016-09-09
|
* Translation updatesGeorg Koppen2016-09-09
|
* Bug 14271: Make Torbutton work with Unix Domain Socket optionKathy Brade2016-09-09
| | | | | | Call Tor Launcher's new TorGetControlSocketFile() function to determine if a Unix domain socket is being used for Tor control port communication and, if it is, use it instead of a TCP connection.
* Bug 19733: GETINFO response parser doesn't handle AF_UNIX entries.Kathy Brade2016-09-08
| | | | | | When performing the local Tor check (which compares the configured Firefox SOCKS proxy to the one reported by GETINFO net/listeners/socks), correctly handle UNIX domain sockets as well as IPv6 addresses.
* fixup! Bug 15852: Remove/synchronize Torbutton SOCKS pref logicKathy Brade2016-08-30
| | | | | Restore previous behavior: do not reset the SOCKS-related preferences when the TOR_SOCKS_HOST and TOR_SOCKS_PORT environment variables are not set.
* Bug 18589: Clear site security settings during New Identitybug_19995Georg Koppen2016-08-26
| | | | | We need to clear site security settings (like HSTS) explicitely now as they don't belong to the permissions manager anymore.
* Bug 15852: Remove/synchronize Torbutton SOCKS pref logicKathy Brade2016-08-25
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Remove the remains of the Torbutton settings panel (which was hidden by the fix for bug 14630). Remove the status bar panel (the status bar was removed in Firefox 4). Remove the outdated "Disable Torbutton to change these settings" message from the Firefox proxy settings dialog. Change the behavior of the "Restore Defaults" button in the Privacy and Security Settings window to no longer reset the browser's proxy preferences. Our general philosophy is that if Torbutton does not provide a GUI for changing a preference, Torbutton should not modify the preference. The exceptions are that Torbutton still supports the TOR_SOCKS_PORT and TOR_TRANSPROXY environment variables. Remove a lot of toggle logic, including extensions.torbutton.tor_enabled and related preferences. Remove the dual cookie jar support since Tor can no longer be turned off. Rename torbutton_close_on_toggle() to torbutton_close_tabs_on_new_identity(). Remove torbutton_check_socks_remote_dns() since SOCKS remote DNS is supported by all modern versions of Firefox. Remove torbutton_has_good_socks() since it was testing for Firefox 5 or newer. Remove unused Firefox version check variables, unused functions, and commented out code.
* Bug 19837: Whitelist internal URLs that Firefox requires for media.Yawning Angel2016-08-19
| | | | | | | | | | | | Firefox requires being able to load chrome:// and resource:// URLs for things like the media player, with the origin set to the remote URL that triggered the load. This is unfortunate in that there's no way to disambiguate malicious JS versus someone opening a video file (for example). See https://trac.torproject.org/projects/tor/ticket/19837#comment:5 for why this is a huge nightmare and will eventually require C++ code.
* Bug 19906: "Maximizing Tor Browser" Notification can exist multiple timesKathy Brade2016-08-12
| | | | Do not add another notification if one is already visible.
* Release preparations for 1.9.6.1Mike Perry2016-07-28
| | | | CHANGELOG update, version bump
* Merge remote-tracking branch 'yawning/bug8725_take3'Mike Perry2016-07-28
|\
| * Bug 8725: Consistently deny redirects to browser/addon internal URLs.Yawning Angel2016-07-16
| | | | | | | | | | | | | | | | | | The browser's behavior is different depending on if a given internal resource is available or not, regardless of the fact that the actual body will not load due to the various safeguards and checks. This normalizes the behavior by denying all redirects destined for URLs with proscribed browser internal schemes (`resource`, `about`, `chrome`).
| * Bug 8725: Block `chrome://` based fingerprinting with nsIContentPolicy.Yawning Angel2016-06-17
| | | | | | | | | | | | | | | | | | Most addons do not set `contentaccessible=yes`, however behavior should be consistent even if such addons are installed. This does not affect any of the standard addons shipped with Tor Browser, but will break user installed addons that depend on actually being able to access `chrome://` URLs in this manner.
| * Bug 8725: Block `resource://` based fingerprinting with nsIContentPolicy.Yawning Angel2016-06-17
| | | | | | | | | | Based on ResourceFilter: A direct workaround for https://bugzil.la/863246 https://notabug.org/desktopd/no-resource-uri-leak/src/master/src/resource-filter/content-policy.js
* | fixup! Bug 19273: Avoid JavaScript patching of the external app helper dialog.Georg Koppen2016-07-17
| | | | | | | | Remove remaining things needed for fixing #9901.
* | Bug 19273: Avoid JavaScript patching of the external app helper dialog.Kathy Brade2016-07-17
| | | | | | | | | | | | | | | | | | Display the external app confirmation dialog in response to the new "external-app-requested" observer service notification. Remove messy overrides of Mozilla components and console log filtering. Remove obsolete "on-modify-drag-list" observer and pre-Firefox 4.0 module registration code from the External App Handler component.
* | Bug 19417: Disable asmjs for nowGeorg Koppen2016-07-17
| | | | | | | | | | | | | | | | | | We are exempting `javascript.options.asmjs` from the Security Slider for now and set it to `false` by default (which is done by a separate Tor Browser patch). This is a stopgap until at least the linkability concerns in #19417 are addressed.
* | Bug 19689: Plugin prompt is parented to wrong windowKathy Brade2016-07-17
| | | | | | | | | | | | | | When displaying the "Are you sure you want to enable plugins?" prompt, always use the top-most browser window as the parent window. This avoids problems caused by using the Privacy and Security Settings dialog, which is closing, as the parent.
* | Bug 19417: Clear asmjscachebug_19417Georg Koppen2016-06-17
|/ | | | | | | | This patch clears the asmjscache (and the IndexedDB storage) on New Identity and during start-up. The latter is a suboptimal workaround we deploy until the asmjscache is Private Browsing Mode aware. InedxedDB storage is not so urgent as IndexedDB is not working in Private Browsing Mode anyway.
* Bug 19206: Clear out the domain isolator state on `New Identity`.Yawning Angel2016-06-10
| | | | | | | Additionally clear out the domain isolator state on `New Identity`. In theory this removes the need to explicitly issue a `NEWNYM` as new circuits will be used for all subsequent requests, including those made via the catch-all circuit.
* Bug 19206: Include a 128 bit random tag as part of the domain isolator nonce.Yawning Angel2016-06-10
| | | | | | | | | | | When creating a domain isolation nonce, 128 bits of entropy is drawn from a cryptographic source and saved on a per-domain basis. The new circuit behavior is changed to regenerate the nonce, instead of incrementing a counter. This allows the "right thing" to happen when the same tor instance is used across multiple Tor Browser sessions, for example when using a system wide tor, or a magic anonymity box.
* Release preparations for 1.9.6Georg Koppen2016-06-04
| | | | CHANGELOG update, version bump
* Bug 18238: remove unused Torbutton code and stringsKathy Brade2016-05-31
| | | | Remove default preferences that are not used.
* Bug 18238: remove unused Torbutton code and stringsKathy Brade2016-05-31
| | | | Remove unused property strings.
* Bug 18238: remove unused Torbutton code and stringsKathy Brade2016-05-31
| | | | | Remove unused entities. Remove unused "about.xul" and associated entities.
* Bug 17599: Provide shortcuts for New Identity and New CircuitGeorg Koppen2016-05-24
| | | | Thanks to cpwc for the patch.
* Bug 18743: Pref to hide 'Sign in to Sync' button in hamburger menuArthur Edelstein2016-05-16
|
* Bug 18980: Remove obsolete toolbar button codeArthur Edelstein2016-05-09
|
* Bug 18905: Hide unusable items from help menuArthur Edelstein2016-05-04
|
* Release preparations for 1.9.5.3Georg Koppen2016-04-22
| | | | Version bumps, changelog update
* Translation updatesGeorg Koppen2016-04-22
|
* Bug 18466: Make Torbutton compatible with ESR45bug_18466_v2Georg Koppen2016-04-07
| | | | | Our usage of |let| does not work anymore since changes in Firefox 44 landed. See: https://bugzilla.mozilla.org/show_bug.cgi?id=589199.