[tor-bugs] #9868 [EFF-HTTPS Everywhere]: Stop bundling rulesets with extension, download separately instead (like ABP)

Tor Bug Tracker & Wiki blackhole at torproject.org
Wed Oct 2 22:46:40 UTC 2013


#9868: Stop bundling rulesets with extension, download separately instead (like
ABP)
--------------------------------------+-------------------
     Reporter:  micahlee              |      Owner:  pde
         Type:  enhancement           |     Status:  new
     Priority:  normal                |  Milestone:
    Component:  EFF-HTTPS Everywhere  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:  #9769
       Points:                        |
--------------------------------------+-------------------

Comment (by micahlee):

 Here's how I'm thinking of implementing this.

 I will add a new pref called
 extensions.https_everywhere.rulesets_updated_ts that contains the
 timestamp of the last ruleset update, defaulting to 0.

 I'll define a function an update_rulesets function with an optional force
 argument. If it's been either 24 hours since an update or force is true,
 it will:

 * Download the new default.rulesets file
 * Download the detached sig, default.rulesets.sig
 * Verify if the sig
 * If the sig checks out, save default.rulesets to disk and load it into
 memory

 I'll run the update_rulesets function when HTTPS Everywhere initializes,
 and also set it to run every 24 hours. If there's no default_rulesets file
 on disk I'll run it with force set to true.

 I also want to build some more UI around this. The UI should say the last
 date that the rulesets were updated with a button to force an update now.
 This could either be in the current "Enable / Disable Rules" dialog, or in
 a more generic HTTPS Everywhere preferences dialog that doesn't exist yet.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9868#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list