[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #5912 [EFF-HTTPS Everywhere]: MyWOT extension breakage
#5912: MyWOT extension breakage
----------------------------------+-----------------------------------------
Reporter: pde | Owner: pde
Type: defect | Status: new
Priority: normal | Milestone:
Component: EFF-HTTPS Everywhere | Version:
Keywords: | Parent: #3190
Points: | Actualpoints:
----------------------------------+-----------------------------------------
Comment(by sami):
Guys, requests from the WOT add-on are already encrypted and
authenticated, which is why HTTPS is not used by default. However, our
servers do support HTTPS, so forcing the requests to use HTTPS shouldn't
be a problem.
However, the problem appears to be that HTTPS Everywhere 3.0development.3
simply breaks the XMLHttpRequests our add-on makes to api.mywot.com,
instead of transparently redirecting them to use HTTPS. I'm not sure what
has changed, because there were no conflicts with 2.0.5.
Are you saying it's not possible for you to rewrite the requests
transparently, but it would require changes to our add-on instead?
Note that the add-on only communicates with api.mywot.com, so any rules
that apply to other subdomains do not affect it.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5912#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs