[tor-bugs] #6484 [EFF-HTTPS Everywhere]: host=*.domain wildcarding broken

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Mon Jul 30 06:20:13 UTC 2012


#6484: host=*.domain wildcarding broken
----------------------------------+-----------------------------------------
 Reporter:  grarpamp              |          Owner:  pde
     Type:  defect                |         Status:  new
 Priority:  normal                |      Milestone:     
Component:  EFF-HTTPS Everywhere  |        Version:     
 Keywords:                        |         Parent:     
   Points:                        |   Actualpoints:     
----------------------------------+-----------------------------------------
 "
 https://www.eff.org/https-everywhere/rulesets

 A target may, however, contain a wildcard in one portion of the domain
 (like *.google.com or google.*, but *.google.* would not work). A wildcard
 on the left will match arbitrarily deep subdomains (for instance,
 *.facebook.com will match s-static.ak.facebook.com).1

 Exception: currently this is not true for a target host that is less than
 three levels deep. <target host="*.com"> would match thing.com but not
 very.thing.com. We would consider changing that if anybody needs to use
 it. <target host="*"> means a ruleset should be tested for every single
 URL.
 "


 Sure, all fine. But put a said host='*.2ld.tld' in xmlconfig, and browse a
 4ld.3ld.2ld.tld, and you will not be rewritten. So it's broken, or
 counter-documented.

 I would fix it by sticking to the (pcre.org / www.regular-
 expressions.info/pcre.html) that the rules overall seem to conform to,
 rather than making the separate documented hack...
 host='^.*\.2ld\.tld$' is not so bad.... assuming I got this report right,
 that is.

 If not, what regex are the rules written in?

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6484>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list