[tor-bugs] #7886 [EFF-HTTPS Everywhere]: Implement a network-layer test harness for HTTPS Everywhere corectness

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Jan 9 04:39:31 UTC 2013


#7886: Implement a network-layer test harness for HTTPS Everywhere corectness
----------------------------------+-----------------------------------------
 Reporter:  pde                   |          Owner:  schoen        
     Type:  task                  |         Status:  needs_revision
 Priority:  normal                |      Milestone:                
Component:  EFF-HTTPS Everywhere  |        Version:                
 Keywords:                        |         Parent:                
   Points:                        |   Actualpoints:                
----------------------------------+-----------------------------------------
Changes (by schoen):

  * status:  new => needs_revision


Comment:

 I sent a quick-and-dirty prototype of this (using the tshark command and
 the Python ruleset parser from Ondrej Mikle's https-everywhere-checker) to
 Peter.

 It seems to work (it quite clearly detects when HTTPS Everywhere is turned
 off or if you browse from a browser that's not using it, complaining about
 every single URL access on sites that have rulesets) but it's still
 missing two necessary features to exclude false positive warnings: the
 redirection loop detector (that needs to parse stdout from the browser
 under test) and perhaps the use of lsof -i -n or the netstat watcher to
 exclude HTTP requests that originate from something other than that
 browser.

 I am wondering where there's a sockets equivalent of inotify so that we
 could subscribe to be notified when a particular process makes (or when
 other processes make) a TCP connection.  We could ptrace it (ugh!).

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/7886#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list