Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP: Toss cookies and other browsing data for New Tor Identity. #2425

Closed
wants to merge 2 commits into from

Conversation

riastradh-brave
Copy link
Contributor

fix brave/brave-browser#3872

Submitter Checklist:

Test Plan:

  1. Open a private window with Tor.
  2. Log into https://trac.torproject.org/ with cypherpunks/writecode.
  3. Hamburger menu ⟶ New Tor Identity
  4. Confirm that you are now logged out of trac.torproject.org.

Reviewer Checklist:

  • New files have MPL-2.0 license header.
  • Request a security/privacy review as needed.
  • Adequate test coverage exists to prevent regressions
  • Verify test plan is specified in PR before merging to source

After-merge Checklist:

  • The associated issue milestone is set to the smallest version that the
    changes has landed on.
  • All relevant documentation has been updated.

@riastradh-brave riastradh-brave added feature/tor CI/skip Do not run CI builds (except noplatform) labels May 11, 2019
Copy link
Collaborator

@bridiver bridiver left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

there are definitely problems with this approach and it also shouldn't be in browser_commands anyway, this kind of stuff should be handled by the browser context or the tor service


// Flush everything else in the storage partition.
void NewTorIdentityCallbackClearData(WebContents* current_tab) {
auto* context = current_tab->GetBrowserContext();
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure any of this is necessary because I believe we're already using a new partition/network context when cycling, but this not only has race conditions, it will also cause problems for other tabs because it deletes data across the entire browser context, not just the individual tab

@riastradh-brave riastradh-brave force-pushed the riastradh-3872-tosscookiesintor branch from 7964fbf to f3307f3 Compare May 24, 2019 19:03
@riastradh-brave riastradh-brave force-pushed the riastradh-3872-tosscookiesintor branch from f3307f3 to 810612c Compare June 19, 2019 14:34
@bbondy
Copy link
Member

bbondy commented Jul 17, 2019

Is this still valid? No updates for a month. Thanks.

@riastradh-brave
Copy link
Contributor Author

This is a draft that doesn't quite work right and that isn't worth revisiting until after we have introduced a mechanism for first-party isolation, which is higher-priority. So, not abandoned, but not mergeable yet.

@bsclifton
Copy link
Member

Closing as stale. We can keep the branch of course, in case we wanted to revisit

@bsclifton bsclifton closed this Jun 18, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CI/skip Do not run CI builds (except noplatform) feature/tor
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Clear cookies in private+Tor window? Completely restart private+Tor window preserving open tabs?
4 participants