"This release features an important security update to Tor Browser for Linux users. On Linux systems with GVfs/GIO support Firefox allows to bypass proxy settings as it ships a whitelist of supported protocols. Once an affected user navigates to a specially crafted URL the operating system may directly connect to the remote host, bypassing Tor Browser. Tails and Whonix users, and users of our sandboxed Tor Browser are unaffected, though."
(Score: 2) by frojack on Tuesday August 01 2017, @08:18PM (1 child)
Are we sure it has anything to do with firefox, and not the linux TCP stack?
I saw a longish discussion on the the opensuse list about this very issue not long ago.
The application does not have total control of the routing. Any leakage of ultimate destination IP back to the client TCP stack will often trigger route metrics ("cost") to kick in if there are ANY other routes defined and enabled with lower metric.
No, you are mistaken. I've always had this sig.
(Score: 2) by FatPhil on Wednesday August 02 2017, @08:25AM
Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves