I promised Jake that if he posted a pre-release of torbutton-birdy publicly to tor-talk I'd review and test it. He did, so I'll review his work and test it in wireshark and see what happens.
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
Yeah, I am downloaded the Thunderbird source to have a quick look at options today. I suspect that you can attack a XUL overlay binding to that damn autoconfig window and write some javascript to keep closing that fucker and/or navigate the user to the advanced window (which I think does not bypass proxy, right?)
I don't have time to write the code for you, but I'll see if I can find the names of the relevant XUL files you need to attach overlays to.
Yeah, I am downloaded the Thunderbird source to have a quick look at options today. I suspect that you can attack a XUL overlay binding to that damn autoconfig window and write some javascript to keep closing that fucker and/or navigate the user to the advanced window (which I think does not bypass proxy, right?)
I don't have time to write the code for you, but I'll see if I can find the names of the relevant XUL files you need to attach overlays to.
This overlay is now in version 0.0.2 thanks to Sukhbir.
The timezone disclosure issue should now be fixed in version 0.0.2 as we set it to UTC. It's not fantastic by any means but it is certainly more uniform.
We still need to solve the message ID information leak and the reply_header_authorwrote issues. I suspect those are the two main issues left before we might consider a proper release.
It could also be the case that Thunderbird's app launching is more controlled than Firefox. Firefox tries to have warning dialogs before auto-launching shit, it just fails miserably at it.
The prefs that are supposed to cause Firefox to launch a warning dialog are network.protocol-handler.warn*. There's also several other network.protocol-handler prefs that might be relevant.
Probably worth trying those out before trying to port that component over.
We still need to solve the message ID information leak and the reply_header_authorwrote issues. I suspect those are the two main issues left before we might consider a proper release.
The reply_header_authorwrote issue has been fixed now.
We still need to solve the message ID information leak and the reply_header_authorwrote issues. I suspect those are the two main issues left before we might consider a proper release.
The reply_header_authorwrote issue has been fixed now.
So - I think that means we're not leaking directly from the proxy, not leaking language information, the autoconf wizard is blocked and now setting UTC for everything; what remains to be fixed before we suggest regular people use it?
We do enable warnings for external handlers:
pref("network.protocol-handler.warn-external.http", true);
pref("network.protocol-handler.warn-external.https", true);
Can you get your own trac component torbirdy? That'd be better than having everything inside here in one thread.
Yep, we should do this. I just created component TorBirdy and set ioerror as the owner of it for now. We should file all the known bugs there instead of in the TODO file+mailinglist.