[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #7886 [EFF-HTTPS Everywhere]: Implement a network-layer test harness for HTTPS Everywhere corectness
#7886: Implement a network-layer test harness for HTTPS Everywhere corectness
----------------------------------+-----------------------------------------
Reporter: pde | Owner: schoen
Type: task | Status: needs_revision
Priority: normal | Milestone:
Component: EFF-HTTPS Everywhere | Version:
Keywords: | Parent:
Points: | Actualpoints:
----------------------------------+-----------------------------------------
Changes (by schoen):
* status: new => needs_revision
Comment:
I sent a quick-and-dirty prototype of this (using the tshark command and
the Python ruleset parser from Ondrej Mikle's https-everywhere-checker) to
Peter.
It seems to work (it quite clearly detects when HTTPS Everywhere is turned
off or if you browse from a browser that's not using it, complaining about
every single URL access on sites that have rulesets) but it's still
missing two necessary features to exclude false positive warnings: the
redirection loop detector (that needs to parse stdout from the browser
under test) and perhaps the use of lsof -i -n or the netstat watcher to
exclude HTTP requests that originate from something other than that
browser.
I am wondering where there's a sockets equivalent of inotify so that we
could subscribe to be notified when a particular process makes (or when
other processes make) a TCP connection. We could ptrace it (ugh!).
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7886#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs