[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #1672 [EFF-HTTPS Everywhere]: Firefox search box typeahead completion leaks plaintext queries



#1672: Firefox search box typeahead completion leaks plaintext queries
----------------------------------+-----------------------------------------
 Reporter:  schoen                |       Owner:  pde
     Type:  defect                |      Status:  new
 Priority:  major                 |   Milestone:     
Component:  EFF-HTTPS Everywhere  |     Version:     
 Keywords:                        |      Parent:     
----------------------------------+-----------------------------------------
 Even if an HTTPS Everywhere rule matches the relevant URL, typing text in
 the Firefox search box will send unencrypted HTTP queries to the host
 defined for typeahead completion in the search engine definition file.

 HTTPS Everywhere thinks it is rewriting these queries (according to the
 error console), but a packet sniffer verifies that the rewriting never
 occurs and the queries are actually sent as plaintext!  (To be more
 precise, the protocol scheme and host are never effectively changed; a
 rewrite rule can still have an effect on the path part of the URL.)

 See
 https://mail1.eff.org/pipermail/https-everywhere/2010-July/000025.html
 for more details.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/1672>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online