#27307 (moved) is a report that NoScript shows HTTP .onions in red (compared to HTTPS ones in green). Giorgio would be happy to change that. We should think about a good way signaling NoScript that it is running in Tor Browser as it could then treat .onion domains differently.
Giorgio's suggestion was:
>> > console.log(await browser.runtime.getBrowserInfo())> > Object { name: "Firefox", vendor: "Mozilla", version: "60.1.0", buildID: "20180204020101" }>> > Maybe you could send an "isTorBrowser: true" additional property within your updateSettings messages.
There might be other ones we could consider
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
ma1: Any stoppers to make progress on that ticket on your side? It seems we have everything in place on our side to let you treat Tor Browser users differently and treat .onion over http as secure.
ma1: Any stoppers to make progress on that ticket on your side? It seems we have everything in place on our side to let you treat Tor Browser users differently and treat .onion over http as secure.
Thanks, that's better. There is still the scary http: in red which should not be relevant for .onions either. Additionally, the expectation here is that onions over http:// on medium level security can actually run JavaScript etc. because http:// is secure for .onion domains They should get treated as loaded over https://. Could you address those two items for Tor Browser users? (I am fine opening a new bug for the latter if you like)
A general note, while testing rc11:
After installing it in the browser I needed to click twice on the NoScript icon until the page related info showed up. On first click only a small empty menu was visible.
After restarting the browser it takes like 5-10 second until the NoScript icon gets clickable at all and CPU of my laptop gets eaten meanwhile. There is something computationally heavy going on in the background here...
Thanks, that's better. There is still the scary http: in red which should not be relevant for .onions either.
If you mean the lonesome "http:" entry which is displayed on any http://acme.com page at your "Safer" security level, don't you think I should just hide it for any website (in the popup at least, if not NoScript's Options page)? After all, rather than downgrading the whole security level from the popup menu by setting "http:" to DEFAULT or TRUSTED, we want user to interact with the security slider, don't we?
Additionally, the expectation here is that onions over http:// on medium level security can actually run JavaScript etc. because http:// is secure for .onion domains They should get treated as loaded over https://. Could you address those two items for Tor Browser users? (I am fine opening a new bug for the latter if you like)
Yes, please. On ticket #27307 (moved) someone stated that was not the goal.
After installing it in the browser I needed to click twice on the NoScript icon until the page related info showed up. On first click only a small empty menu was visible.
After restarting the browser it takes like 5-10 second until the NoScript icon gets clickable at all and CPU of my laptop gets eaten meanwhile. There is something computationally heavy going on in the background here...
The two are likely related. Did you have many tabs opened when installing?
Thanks, that's better. There is still the scary http: in red which should not be relevant for .onions either.
If you mean the lonesome "http:" entry which is displayed on any http://acme.com page at your "Safer" security level, don't you think I should just hide it for any website (in the popup at least, if not NoScript's Options page)? After all, rather than downgrading the whole security level from the popup menu by setting "http:" to DEFAULT or TRUSTED, we want user to interact with the security slider, don't we?
Yeah, I meant that and hiding that lonesome "http:" sounds good.
Additionally, the expectation here is that onions over http:// on medium level security can actually run JavaScript etc. because http:// is secure for .onion domains They should get treated as loaded over https://. Could you address those two items for Tor Browser users? (I am fine opening a new bug for the latter if you like)
Yes, please. On ticket #27307 (moved) someone stated that was not the goal.
Actually, we already have a ticket for that: #21004 (moved).
After installing it in the browser I needed to click twice on the NoScript icon until the page related info showed up. On first click only a small empty menu was visible.
After restarting the browser it takes like 5-10 second until the NoScript icon gets clickable at all and CPU of my laptop gets eaten meanwhile. There is something computationally heavy going on in the background here...
The two are likely related. Did you have many tabs opened when installing?
I did not. Let me retest and get back to you with steps to reproduce.
After installing it in the browser I needed to click twice on the NoScript icon until the page related info showed up. On first click only a small empty menu was visible.
After restarting the browser it takes like 5-10 second until the NoScript icon gets clickable at all and CPU of my laptop gets eaten meanwhile. There is something computationally heavy going on in the background here...
The two are likely related. Did you have many tabs opened when installing?
I did not. Let me retest and get back to you with steps to reproduce.
Okay, it seems I can only repro 1) reliably. Here is what I did
The bug as described is visible: the NoScript menu contents are shown only every other click on the icon (otherwise the menu is empty). A restart seems to fix that, though.