[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #10033 [EFF-HTTPS Everywhere]: Make it easy for users to add a hostname to the ruleset in Firefox
#10033: Make it easy for users to add a hostname to the ruleset in Firefox
--------------------------------------+---------------------------
Reporter: realityexists | Owner: pde
Type: enhancement | Status: new
Priority: major | Milestone:
Component: EFF-HTTPS Everywhere | Version: HTTPS-E 3.2.2
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+---------------------------
Comment (by cypherpunks):
The following is from the NoScript FAQ (https://noscript.net/faq#qa6_3):
Q: Can NoScript force some sites to always use HTTPS?
A: Yes, just open NoScript Options|Advanced|HTTPS|Behavior, entering the
sites you want to force in the topmost box, and those you want to always
leave alone in the bottom one.
You can use space-separated simple strings, which will be matched as
"starts with...", glob patterns like *.noscript.net and full-fledged
regular expressions.
If, for instance, you want HTTPS to be forced on every Google application
excluding Search and iGoogle, you can put *.google.com in the "Force" box
and www.google.com/search www.google.com/ig in the "Never" box.
The latter can be of course rewritten as a
^https?://www\.google\.com/(?:search|ig)\b.* regular expression.
To force HTTPS over a website's base domain and all its subdomains, type
.example.com in the "Force" box. This forces HTTPS for example.com,
subdomains.example.com, and multiple.nested.subdomains.example.com.
Since NoScript is installed by default in the Tor Browser Bundle, this
seems like a useful method for most users.
HTTPS Finder requires installing a separate (possibly untrusted) add-on,
but I use it and it works well (I'm not the user who originally
recommended it, however). It contains options to automatically force HTTPS
if a site supports it, and options to automatically secure cookies. There
are possible privacy implications, though, since it autodetects HTTPS
support by trying to make a secure connection for every visited website.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/10033#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs