Sebastian Hahn commited on 2015-07-06 03:40:25
Zeige 3 geänderte Dateien mit 11 Einfügungen und 11 Löschungen.
... | ... |
@@ -172,9 +172,9 @@ investigated is also capable of performing network activity independent of |
172 | 172 |
browser proxy settings - and often independent of its own proxy settings. |
173 | 173 |
Sites that have plugin content don't even have to be malicious to obtain a |
174 | 174 |
user's |
175 |
-Non-Tor IP (it usually leaks by itself), though <ulink |
|
176 |
-url="http://decloak.net">plenty of active |
|
177 |
-exploits</ulink> are possible as well. In addition, plugins can be used to store unique identifiers that are more |
|
175 |
+Non-Tor IP (it usually leaks by itself), though |
|
176 |
+plenty of active |
|
177 |
+exploits are possible as well. In addition, plugins can be used to store unique identifiers that are more |
|
178 | 178 |
difficult to clear than standard cookies. |
179 | 179 |
<ulink url="http://epic.org/privacy/cookies/flash.html">Flash-based |
180 | 180 |
cookies</ulink> fall into this category, but there are likely numerous other |
... | ... |
@@ -1181,8 +1181,8 @@ url="https://gitweb.torproject.org/torbutton.git/blob_plain/HEAD:/src/chrome/con |
1181 | 1181 |
url="http://java.sun.com/j2se/1.5.0/docs/api/java/net/class-use/NetworkInterface.html">can query</ulink> the <ulink |
1182 | 1182 |
url="http://www.rgagnon.com/javadetails/java-0095.html">local IP |
1183 | 1183 |
address</ulink> and report it back to the |
1184 |
-remote site. They can also <ulink |
|
1185 |
-url="http://decloak.net">bypass proxy settings</ulink> and directly connect to a |
|
1184 |
+remote site. They can also |
|
1185 |
+>bypass proxy settings and directly connect to a |
|
1186 | 1186 |
remote site without Tor. Every browser plugin we have tested with Firefox has |
1187 | 1187 |
some form of network capability, and every one ignores proxy settings or worse - only |
1188 | 1188 |
partially obeys them. This includes but is not limited to: |
... | ... |
@@ -2696,7 +2696,7 @@ testing, and also in the hope that some brave soul will one day decide to |
2696 | 2696 |
combine them into a comprehensive automated test suite. |
2697 | 2697 |
|
2698 | 2698 |
<orderedlist> |
2699 |
- <listitem><ulink url="http://decloak.net/">Decloak.net</ulink> |
|
2699 |
+ <listitem>Decloak.net (defunct) |
|
2700 | 2700 |
<para> |
2701 | 2701 |
|
2702 | 2702 |
Decloak.net is the canonical source of plugin and external-application based |
... | ... |
@@ -95,8 +95,8 @@ investigated is also capable of performing network activity independent of |
95 | 95 |
browser proxy settings - and often independent of its own proxy settings. |
96 | 96 |
Sites that have plugin content don't even have to be malicious to obtain a |
97 | 97 |
user's |
98 |
-Non-Tor IP (it usually leaks by itself), though <a class="ulink" href="http://decloak.net" target="_top">plenty of active |
|
99 |
-exploits</a> are possible as well. In addition, plugins can be used to store unique identifiers that are more |
|
98 |
+Non-Tor IP (it usually leaks by itself), though plenty of active |
|
99 |
+exploits are possible as well. In addition, plugins can be used to store unique identifiers that are more |
|
100 | 100 |
difficult to clear than standard cookies. |
101 | 101 |
<a class="ulink" href="http://epic.org/privacy/cookies/flash.html" target="_top">Flash-based |
102 | 102 |
cookies</a> fall into this category, but there are likely numerous other |
... | ... |
@@ -636,7 +636,7 @@ callback <code class="function">torbutton_prefs_test_settings()</code> in <a cla |
636 | 636 |
|
637 | 637 |
</p></div></div><div class="sect2" title="5.2. Dynamic Content Settings"><div class="titlepage"><div><div><h3 class="title"><a id="id2686645"></a>5.2. Dynamic Content Settings</h3></div></div></div><div class="sect3" title="Disable plugins on Tor Usage (crucial)"><div class="titlepage"><div><div><h4 class="title"><a id="plugins"></a>Disable plugins on Tor Usage (crucial)</h4></div></div></div><p>Option: <span class="command"><strong>extensions.torbutton.no_tor_plugins</strong></span></p><p>Java and plugins <a class="ulink" href="http://java.sun.com/j2se/1.5.0/docs/api/java/net/class-use/NetworkInterface.html" target="_top">can query</a> the <a class="ulink" href="http://www.rgagnon.com/javadetails/java-0095.html" target="_top">local IP |
638 | 638 |
address</a> and report it back to the |
639 |
-remote site. They can also <a class="ulink" href="http://decloak.net" target="_top">bypass proxy settings</a> and directly connect to a |
|
639 |
+remote site. They can also bypass proxy settings and directly connect to a |
|
640 | 640 |
remote site without Tor. Every browser plugin we have tested with Firefox has |
641 | 641 |
some form of network capability, and every one ignores proxy settings or worse - only |
642 | 642 |
partially obeys them. This includes but is not limited to: |
... | ... |
@@ -1309,7 +1309,7 @@ individually. They are provided here for reference and future regression |
1309 | 1309 |
testing, and also in the hope that some brave soul will one day decide to |
1310 | 1310 |
combine them into a comprehensive automated test suite. |
1311 | 1311 |
|
1312 |
- </p><div class="orderedlist"><ol class="orderedlist" type="1"><li class="listitem"><a class="ulink" href="http://decloak.net/" target="_top">Decloak.net</a><p> |
|
1312 |
+ </p><div class="orderedlist"><ol class="orderedlist" type="1"><li class="listitem">Decloak.net (defunct)<p> |
|
1313 | 1313 |
|
1314 | 1314 |
Decloak.net is the canonical source of plugin and external-application based |
1315 | 1315 |
proxy-bypass exploits. It is a fully automated test suite maintained by <a class="ulink" href="http://digitaloffense.net/" target="_top">HD Moore</a> as a service for people to |
... | ... |
@@ -595,7 +595,7 @@ connections are not attempted, through the proxy or otherwise (Tor does not |
595 | 595 |
yet support IPv6). We have also verified that external protocol helpers, such |
596 | 596 |
as SMB URLs and other custom protocol handlers are all blocked. |
597 | 597 |
|
598 |
- </p></li><li class="listitem"><span class="command"><strong>Disabling plugins</strong></span><p>Plugins have the ability to make arbitrary OS system calls and <a class="ulink" href="http://decloak.net/" target="_top">bypass proxy settings</a>. This includes |
|
598 |
+ </p></li><li class="listitem"><span class="command"><strong>Disabling plugins</strong></span><p>Plugins have the ability to make arbitrary OS system calls and bypass proxy settings. This includes |
|
599 | 599 |
the ability to make UDP sockets and send arbitrary data independent of the |
600 | 600 |
browser proxy settings. |
601 | 601 |
</p><p> |
602 | 602 |