[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6733 [Firefox Patch Issues]: Patch Firefox to allow addons to set SOCKS username+password per request
#6733: Patch Firefox to allow addons to set SOCKS username+password per request
----------------------------------+-----------------------------------------
Reporter: mikeperry | Owner: mikeperry
Type: enhancement | Status: new
Priority: major | Milestone:
Component: Firefox Patch Issues | Version:
Keywords: interview | Parent: #3455
Points: | Actualpoints:
----------------------------------+-----------------------------------------
Changes (by benb):
* cc: com.tor.trac@â (added)
Comment:
When and from where exactly would you set this?
In current Firefox code, the proxy is determined at the time the channel
is created. This is logical, because the proxy determines which kind of
physical channel is opened: via TCP directly, or SOCKS or a HTTP proxy, so
that needs to happen at the time the channel is opened. Consequently, this
can't be changed at any time the channel object exists.
There are several APIs how channels can come into being. If I could see -
maybe even run (install a XPI, not a full browser build) - the code, that
would help.
Does that code exist at all yet? From what I understood, you need that to
segregate all requests made for one site from all requests for another
site. Even if both contact google-analytics.com, the two should be
separate, by means of a different SOCKS username. That would mean you'd
need to intercept requests that the browser makes, not only modify those
that you initiate. Does that intercept code exist yet? If you had only one
global proxy so far, you might not have needed it, or maybe you have it
already for other reasons. Such a hookup would be a task by itself.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6733#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs