[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #21067 [- Select a component]: Self-signed, expired, invalid and mixed-content SSL certificates at middle security
#21067: Self-signed, expired, invalid and mixed-content SSL certificates at middle
security
--------------------------------------+-----------------
Reporter: i139 | Owner:
Type: defect | Status: new
Priority: Medium | Milestone:
Component: - Select a component | Version:
Severity: Normal | Keywords:
Actual Points: | Parent ID:
Points: | Reviewer:
Sponsor: |
--------------------------------------+-----------------
when I access a site, with a self-signed, expired and invalid, I can add
it to exceptions, (or not; go back) when I add, this potentially harmful
domain can use JavaScript (because its use HTTPS; assuming we are using
middle slider).
should have a mechanism to forbidden those exceptions and mixed-content to
use JavaScript, because they can be harmful for user, especially assuming
the users don't make any know about the risks.
the options (in my view):
1. force HTTPS untrusted to use HTTP by default.
2. add a script or whatever, to disarm JavaScript on those sites (when
using mid security).
3. a very informative and scarry warning on it.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21067>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs