HttpChannel bypassProxy flag does not honor network.proxy.failover_direct pref
Categories
(Core :: Networking: HTTP, defect, P1)
Tracking
()
| Tracking | Status | |
|---|---|---|
| firefox-esr78 | --- | unaffected |
| firefox-esr91 | --- | unaffected |
| firefox93 | --- | unaffected |
| firefox94 | - | disabled |
| firefox95 | + | fixed |
People
(Reporter: dveditz, Assigned: mixedpuppy)
References
(Regression)
Details
(Keywords: csectype-disclosure, regression, sec-moderate, Whiteboard: [addons-jira][necko-triaged])
A bypassProxy flag was introduced on nsIHttpChannelInternal in bug 1732388, but it does not honor the network.proxy.failover_direct pref. That pref was added so that use-cases like the Tor Browser can say "Never bypass the proxy under any circumstances!" Lives could literally be at stake.
| Reporter | ||
Comment 1•4 years ago
|
||
I believe the flag was added in Firefox 94 but isn't used until the bugs depending on that change land in Fx95. Could be fair to call this "disabled" in the status-Firefox94 box.
| Assignee | ||
Updated•4 years ago
|
Updated•4 years ago
|
Comment 2•4 years ago
|
||
Set release status flags based on info from the regressing bug 1732388
Updated•4 years ago
|
Comment 3•4 years ago
|
||
IIUC, we don't need this in 94 anymore. Un-tracking accordingly.
Comment 4•4 years ago
|
||
Shane, just to double check, in ESR 91 there is no mechanism where we would fall back to bypassing the proxy correct? And that this bug is about ensuring that the pref is respected in 95+?
| Assignee | ||
Comment 5•4 years ago
|
||
Nothing uses the bypass flag right now. The code landed as preparation for later patches, and those patches will have a pref. Because this is not proxy failover, I am using a different pref than network.proxy.failover_direct, so we can make tor aware of the other patches and the pref involved. That work is in Bug 1732792 and associated bugs, and we're intending to land next week on nightly.
| Assignee | ||
Comment 6•4 years ago
|
||
I've moved the pref to static prefs and added a check when attempting to set the bypass flag. This is in the patch for Bug 1732792, so this bug could be closed upon landing that patch.
Updated•4 years ago
|
Updated•4 years ago
|
Comment 7•4 years ago
|
||
https://phabricator.services.mozilla.com/D127170 has not landed yet.
Comment 8•4 years ago
|
||
There is no sec issue yet, as there were no consumers before, and the first user of the bypassProxy flag already checks the pref.
The Implementation of that landed in bug 1732792, at https://hg.mozilla.org/mozilla-central/rev/d1a755a61abf#l3.48
https://phabricator.services.mozilla.com/D127170 will introduce another consumer, and along with it check the pref in the network layer (in case a caller forgets to check the network.proxy.allow_bypass pref).
Updated•4 years ago
|
| Reporter | ||
Updated•3 years ago
|
Updated•3 years ago
|
Description
•