[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #13410 [Tor Browser]: Disable self-signed certificate warnings when visiting .onion sites



#13410: Disable self-signed certificate warnings when visiting .onion sites
-----------------------------+----------------------
     Reporter:  tom          |      Owner:  tbb-team
         Type:  defect       |     Status:  new
     Priority:  normal       |  Milestone:
    Component:  Tor Browser  |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:
       Points:               |
-----------------------------+----------------------

Comment (by vynX):

 Browsers must not attempt to resolve .onion via DNS. If that is a given,
 then MITM attempts using DNS + fake .onion certificates while there is no
 Tor onion involved at all are incapable of succeeding. So the work to be
 done is to get all browser vendors to implement .onion in a failsafe way.
 I believe @ioerror's and @grothoff's IETF drafts for .onion TLD mention
 that... it's also important that .onion isn't the only pseudo-TLD that
 gets excluded from the X.509 monstrosity since we don't want to get stuck
 on .onion for all times.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/13410#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs