In #27431 (moved) and #27375 (moved), it was reported Android is leaking DNS requests. From [ticket:27431#comment:1 27431], in summary:
This is exactly what we feared. It looks like this is the resultof a bug within the Android core HTTP library. This leak is alreadyfixed in the more recent releases of Android. In particular, anyversion after Android O (API 26+) should not leak DNS queries.
We should patch TBA so it relies on the Android core library as little as possible. We don't need the fancy optimizations Android provide with request pools and such, so I think we can simply create and manage a proxy connection ourselves.
#27822 (moved) maybe related (but there isn't enough info available).
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items 0
Show closed items
No child items are currently assigned. Use child items to break down this issue into smaller parts.
Linked items 0
Link issues together to show that they're related.
Learn more.
-I made comment in #27822 (moved) and indeed i was using android o sdk 27
-so again i tested tor on android 7.1
-dns leaks on 7.1
-latest alpha leaks dns
-but orfox is running fine does not leaks dns at all
I have branch 28125 on my public repo. I haven't confirmed it prevents all leaks, yet (but it should). It simply prevents all non-Necko connections. A better patch will take some more time.
-I made comment in #27822 (moved) and indeed i was using android o sdk 27
-so again i tested tor on android 7.1
-dns leaks on 7.1
-latest alpha leaks dns
-but orfox is running fine does not leaks dns at all
I have branch 28125 on my public repo. I haven't confirmed it prevents all leaks, yet (but it should). It simply prevents all non-Necko connections. A better patch will take some more time.
Looks good to me. Do we have an understanding about what those changes break (we'd need to mention that at least in our blog post).
igt0: could you give it a round of testing on your devices, so we can start getting the Firefox security updates to android.
For all my tests I have been using a real device connected to my computer and I am using mitmproxy(https://mitmproxy.org/) to debug http(s) protocol and wireshark for non tls stuff.
Okay, the broken functionality is not great but I think we should pick what we have. commit 2c4b103cfef5eafe276713478abf8bd1db057730 on tor-browser.60.3.0esr-8.5-1 has the fix.
Trac: Status: needs_review to closed Resolution: N/Ato fixed