[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9713 [EFF-HTTPS Everywhere]: Users report HTTPS Everywhere 0.development.11 in some sort of clients1.google.com loop?
#9713: Users report HTTPS Everywhere 0.development.11 in some sort of
clients1.google.com loop?
--------------------------------------+----------------------
Reporter: erinn | Owner: micahlee
Type: defect | Status: assigned
Priority: normal | Milestone:
Component: EFF-HTTPS Everywhere | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+----------------------
Changes (by pde):
* cc: eroseman@â, agl@â (added)
Comment:
CC'ing a couple of knowledgeable Googlers.
I'm on vacation, so I was hoping other people might be able to figure this
out, but it seems like they aren't :/
It sounds like google has added an OCSP responder on a domain that was
previously used for search suggestions. We can't remove coverage for
clients1.google.com without leaving people's partially typed search
queries exposed. So we need a targetted exclusion for something like
http://clients[0-6].google.com/ocsp .
I'm going to try to reproduce and then test that possible fix.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9713#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs