-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
can't change exit nodes/receive new IP in Tor window #19371
Comments
Reproduced on |
Looks like this is related to the SOCK5 auth rewrite in CR96; I see this in the logs from
|
Previuosly, serialization of ProxyServer's HostPortPair used its ToString method which we overrode, but now ProxyServerToPacResultElement explicitly constructs the string by getting host() and port() members and calling ConstructHostPortString. We need to override this behavior to insert auth info. Fixes brave/brave-browser#19371 Chromium change: https://source.chromium.org/chromium/chromium/src/+/5dbd4599a981da1fac5dc5211772fe843a06a9b0 commit 5dbd4599a981da1fac5dc5211772fe843a06a9b0 Author: Eric Orth <[email protected]> Date: Fri Sep 24 21:21:24 2021 +0000 Stop dealing with HostPortPair in proxy_string_util.(cc/h) String->ProxyServer now done using ProxyServer::FromSchemeHostAndPort, and ProxyServer->String now done using ProxyServer::GetHost() and ProxyServer::GetPort(). With less ProxyServer-external dealing with HostPortPair, will aide the future-CL transition to not storing HostPortPair for all proxies. Also has the effect that construction-from-string now results in canonicalization of the ProxyServer hostname. Slight impact on tests that were parsing stuff with now-recognized-as-invalid hostnames (especially the v8 tracing tests that were hacking information into wildly invalid hostnames), but don't expect any real-world impact because these are clearly invalid names that shouldn't ever be able to resolve to real servers. Also moved the hostname:port parsing directly into proxy_string_util.cc (from url_util::ParseHostAndPort()) to avoid silliness like stripping IPv6 brackets just for them to be added back for canonicalization. Bug: 1243398
Verification PASSED on
Connecting to Tor - Logs
Verified
Tor logs
|
Description
With
C96
, users won't be able to connect to a new exit node/get a new IP address. Doing a hard refresh or running throughHamburger Menu
->New Tor connection for this site
doesn't work/change the IP address.Steps to Reproduce
C96
(used1.32.97 Chromium: 96.0.4664.35
in this case)Hamburger Menu
->New Tor connection for this site
(nothing happens)Actual result:
Can't connect to a new exit node/get a new IP address in Tor windows.
Expected result:
Users should be able to change exit nodes/get new IP addresses like they did in previous versions
Reproduces how often:
100% reproducible using the above STR
Brave version (brave://version info)
Version/Channel Information:
N/A
(but it's in the current1.32.x
RC)Yes
Yes
Other Additional Information:
N/A
N/A
N/A
Miscellaneous Information:
CCing @diracdeltas @brave/legacy_qa @mkarolin @rebron
The text was updated successfully, but these errors were encountered: