[tor-bugs] #5912 [EFF-HTTPS Everywhere]: MyWOT extension breakage

Tor Bug Tracker & Wiki torproject-admin at torproject.org
Fri May 18 07:18:25 UTC 2012


#5912: MyWOT extension breakage
----------------------------------+-----------------------------------------
 Reporter:  pde                   |          Owner:  pde  
     Type:  defect                |         Status:  new  
 Priority:  normal                |      Milestone:       
Component:  EFF-HTTPS Everywhere  |        Version:       
 Keywords:                        |         Parent:  #3190
   Points:                        |   Actualpoints:       
----------------------------------+-----------------------------------------

Comment(by sami):

 Guys, requests from the WOT add-on are already encrypted and
 authenticated, which is why HTTPS is not used by default. However, our
 servers do support HTTPS, so forcing the requests to use HTTPS shouldn't
 be a problem.

 However, the problem appears to be that HTTPS Everywhere 3.0development.3
 simply breaks the XMLHttpRequests our add-on makes to api.mywot.com,
 instead of transparently redirecting them to use HTTPS. I'm not sure what
 has changed, because there were no conflicts with 2.0.5.

 Are you saying it's not possible for you to rewrite the requests
 transparently, but it would require changes to our add-on instead?

 Note that the add-on only communicates with api.mywot.com, so any rules
 that apply to other subdomains do not affect it.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5912#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list