-
Notifications
You must be signed in to change notification settings - Fork 2.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a setting for allowing .onion requests in normal windows #33735
Comments
Noting that this is a problem with cURL as well and that this transparent proxying of We'll still add the setting for users who want this use-case to work, but the default behavior will remain the same. |
Hi, do we have any ETA on this? It is really annoying because I cannot use Brave if it updates (at restart)... there's no way to pin to last version when this worked... |
@jurglic I am currently working on this and I expect it will ship with Brave 1.62. |
Verification
|
Verified with
Steps:
Confirmed that the image loads in a
|
Pref On | step 12a |
Pref Off | step 12b |
---|---|---|---|
Also confirmed that the first setting under Tor windows in brave://settings/privacy
has a Learn more link which directs to https://support.brave.com/hc/en-us/articles/360018121491-What-is-a-Private-Window-with-Tor-Connectivity-
Learn more |
Learn more |
---|---|
thanks for this feature. I am having trouble in finding a a way to add proxy configuration to redirect onion URL resolution to tor service running locally using a
|
@king-11 You may want to file a separate issue for this since it's either a separate feature request, or a bug for something that should already work as part of the PAC support. |
Sure thanks @fmarier |
In #32108, we blocked all network requests to
.onion
URLs outside of Tor windows. Such network request will fail due to the need to use the tor proxy in order to resolve and connect to them, but before failing they will leak the name of the Onion services to the DNS resolver.One use case we had not anticipated however was people installing the tor daemon on their (likely OpenWRT or Pi-hole-based) router and then letting all local clients resolve and connect to
.onion
normally outside of Tor windows (or in fact outside of Brave too).The proposed fix is to add a setting in
brave://settings/privacy
under Tor windows:The toggle will be on by default, in line with the RFC 7686 recommendation:
In addition, we should add a devtools console warning pointing to this setting when we block a network request for this reason.
The text was updated successfully, but these errors were encountered: