[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #9713 [EFF-HTTPS Everywhere]: Users report HTTPS Everywhere 0.development.11 in some sort of clients1.google.com loop?



#9713: Users report HTTPS Everywhere 0.development.11 in some sort of
clients1.google.com loop?
--------------------------------------+----------------------
     Reporter:  erinn                 |      Owner:  micahlee
         Type:  defect                |     Status:  assigned
     Priority:  normal                |  Milestone:
    Component:  EFF-HTTPS Everywhere  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+----------------------

Comment (by cypherpunks):

 Google's SSL certificates now have an OCSP responder on
 http://clients1.google.com/ocsp (previously they didn't have an OCSP
 pointer).

 OCSP responses are signed and the OCSP responder serves on HTTPS as well:

 {{{
 curl
 https://clients1.google.com/ocsp/MG4wbDBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCAqfIRlqRC5FoiMwITAfBgkrBgEFBQcwAQIEEgQQBauuhzzvamPnjgfhvS7VVw==
 | hexdump -C
 }}}

 I don't know why things would go so wrong in the client when writing those
 requests.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9713#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs