- 22 Nov, 2015 1 commit
-
-
Dancus authored
-
- 18 Jul, 2015 2 commits
-
-
Austin English authored
Refs: #7525
- 11 Jul, 2015 1 commit
-
- 27 Apr, 2015 1 commit
-
-
intrigeri authored
tor-browser wrapper script: avoid offering avenues to arbitrary code execution to e.g. an exploited Pidgin. AppArmor Ux rules don't sanitize $PATH (https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1045986), which can lead to an exploited application (that's allowed to run this script unconfined, e.g. Pidgin) having this script run arbitrary code, violating that application's confinement. Let's prevent that by setting PATH to a list of directories where only root can write.
-
- 15 Apr, 2015 1 commit
-
-
anonym authored
Thanks to Ivan Bliminse for the patch.
-
- 31 Mar, 2015 3 commits
- 16 Mar, 2015 1 commit
-
- 02 Mar, 2015 1 commit
-
-
Tails developers authored
-
- 22 Feb, 2015 1 commit
-
-
Tails developers authored
-
- 10 Feb, 2015 3 commits
-
-
Tails developers authored
-
Tails developers authored
Unfortunately, the underlying HTTPS stack we use here fails open in those case, so we have to check it ourselves. Currently, we check that the file exists, is readable, is a plain file and is not empty.
-
Tails developers authored
This will ease development and bug-fixing quite a bit.
-
- 05 Feb, 2015 3 commits
-
-
Tails developers authored
That's not something that we expect users to need.
-
Tails developers authored
-
Tails developers authored
-
- 02 Feb, 2015 1 commit
-
-
Tails developers authored
$* doesn't handle arguments with e.g. embedded spaces correctly. The only safe way to do so is "$@". We know that, but for some reason we've been cargo-culting and copy-pasting an old buggy wrapper for years, apparently. Will-Fix: #8603, #8830
-
- 01 Feb, 2015 1 commit
-
-
Tails developers authored
-
- 23 Jan, 2015 1 commit
-
-
Tails developers authored
-
- 16 Jan, 2015 1 commit
-
-
Tails developers authored
GIT_PROXY_COMMAND is taken into account for git:// and Git over SSH, but not for Git over HTTPS. The latter use to work when we were shipping Polipo, probably thanks to the HTTP_PROXY environment variable and friends. Now it's broken. Here, we're dropping usage of GIT_PROXY_COMMAND, and replacing it with a tsocks wrapper. Note: it would be nicer to use torsocks in this wrapper, which would work for git:// and HTTPS, but it would break Git over SSH, since in Tails SSH has its own ProxyCommand set to connect-socks, and then torsocks would block connections initiated by connect-socks to the Tor SOCKS proxy, on the ground that they're aimed at localhost and thus might be DNS requests.
-
- 04 Jan, 2015 1 commit
-
-
https://tails.boum.orgTails developers authored
... instead of hardcoding the path to the CA who signed the current certificate. This will allow us to handle future CA transitions in a nicer way, and without modifying this program anymore.
-
- 23 Dec, 2014 1 commit
-
- 28 Nov, 2014 2 commits
-
-
Tails developers authored
Also, AppArmor: allow Totem to read torsocks.conf. Technically speaking, it's not really required, as the compiled-in defaults are the same as whatever is in the stock torsocks.conf. But still, this avoids nasty error messages in the logs and when running Totem from a terminal.
-
Tails developers authored
-
- 14 Nov, 2014 1 commit
-
-
Tails developers authored
... Or it will be encoded twice. This fixes #7968 - "Tails OpenPGP Applet can't clearsign text including non-ASCII characters". Only affects clearsign, as PGP armored data is always ASCII. Thanks to nodens for the patch!
-
- 02 Nov, 2014 1 commit
-
-
Tails developers authored
This is yet another step on the road towards removing Polipo.
-
- 15 Oct, 2014 5 commits
-
-
Tails developers authored
E.g. if our locale is pt, which doesn't have localized search plugins, we'll use one of pt-PT and pt-BR.
-
Tails developers authored
-
Tails developers authored
-
Tails developers authored
-
Tails developers authored
-
- 14 Oct, 2014 1 commit
-
-
Tails developers authored
-
- 10 Oct, 2014 1 commit
-
-
Tails developers authored
It was a relic of the TBB 3.x times when the profile was located in the parent directory of the TBB browser files. Also patch Tails Greeter with the updated path. That patch should be dropped once it's been upstreamed into Tails Greeter.
-
- 02 Oct, 2014 1 commit
-
-
Tails developers authored
That way one only has to remember to always call firefox with exec_firefox(), and not to set LD_LIBRARY_PATH. As an example, this was forgotten for Tor Launcher, which also was fixed.
-
- 01 Oct, 2014 2 commits
-
-
Tails developers authored
The libstdc++6.so we have (from Debian Wheezy) is too old.
-
Tails developers authored
Since there's some waiting in the NM hook it will block subsequent NM hook unnecessarily. Also, now all I2P start-related code is in one place which makes it easier to comprehend.
-
- 29 Sep, 2014 2 commits
-
-
Tails developers authored
If unzip fails, the check afterwards will catch the error any way.
-
Tails developers authored
I had apparently got it backwards how Firefox deals with the priority of pref files; it's the lexically first that gets priority, not the lexically last.
-