Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread Jesse V
On 09/05/2016 01:19 PM, AKASH DAS wrote:
> If I have to make any patch in the code, do I have to submit it in this
> mailing list or https-everywhere's mailing list? Just a doubt

What are you trying to patch? If you are trying to add a URL to their
whitelist, you don't need to submit a patch as they have a tool for
that. Otherwise, I am not certain how they accept git patches.

Per convention, please reply below the original message instead of above it.

-- 
Jesse V



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread AKASH DAS
If I have to make any patch in the code, do I have to submit it in this
mailing list or https-everywhere's mailing list? Just a doubt

On Mon, Sep 5, 2016 at 10:35 PM, David Fifield 
wrote:

> On Mon, Sep 05, 2016 at 10:28:26PM +0530, AKASH DAS wrote:
> > Can I know the issues that are currently in https everywhere.
>
> I don't know if this is what you're looking for, but here are some open
> bug tracker tickets.
>
> https://trac.torproject.org/projects/tor/query?status=!
> closed&component=HTTPS+Everywhere%2FEFF-HTTPS+Everywhere
> https://trac.torproject.org/projects/tor/query?status=!
> closed&component=HTTPS+Everywhere%2FHTTPS+Everywhere%3A+Chrome
>



-- 

*Akash Das*

*Student Systems Admin*

*Indian Institute Of Information Technology*

*Sricity*
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread David Fifield
On Mon, Sep 05, 2016 at 10:28:26PM +0530, AKASH DAS wrote:
> Can I know the issues that are currently in https everywhere.

I don't know if this is what you're looking for, but here are some open
bug tracker tickets.

https://trac.torproject.org/projects/tor/query?status=!closed&component=HTTPS+Everywhere%2FEFF-HTTPS+Everywhere
https://trac.torproject.org/projects/tor/query?status=!closed&component=HTTPS+Everywhere%2FHTTPS+Everywhere%3A+Chrome
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere

2016-09-05 Thread Jesse V
On 09/05/2016 12:58 PM, AKASH DAS wrote:
> Can I know the issues that are currently in https everywhere.

This is the mailing list for Tor development, so you may want to
redirect your question to the EFF or some different channel.

HTTPS Everywhere has been really smooth for me and I've actually never
had an issue with it across many devices and several years. I know that
some websites don't handle HTTPS correctly, but that's why the EFF built
the tool based on a carefull-managed whitelist. If almost all of your
common websites are using HTTPS, then you might even consider enabling
the "Block all unencrypted requests" option, but then don't be surprised
when your favorite news site no longer loads. The situation is really
improving thanks to Let's Encrypt. :)

-- 
Jesse V



signature.asc
Description: OpenPGP digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] HTTPS Everywhere

2016-09-05 Thread AKASH DAS
Respected all,

Can I know the issues that are currently in https everywhere.

-- 

*Akash Das*

*Student Systems Admin*

*Indian Institute Of Information Technology*

*Sricity*
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere harmful

2015-04-25 Thread Ian Goldberg
On Fri, Apr 24, 2015 at 08:05:43PM -0700, Mike Perry wrote:
> ** Sure, there could be a pile of new attribute flags that could be set
> on every HTML resource tag that says the resource must use a "secure
> http:" channel if the parent document happened to load over a secure
> channel, but the net engineering effort of deploying that correctly far
> exceeds the effort needed to mitigate the namespace fragmentation
> issues that Tim Berners-Lee is seemingly so concerned about.

But just as, as you point out, it is useful for the linker to be able to
say "hard fail if you don't have an _authenticated_ secure channel"
("https://";), even in a world where plain "http://"; means "an encrypted
but possibly unauthenticated channel", the linker may also want to say
things like "hard fail unless the cert is issued by Foo" or "hard fail
unless the cert/pubkey has hash abc123" or "hard fail unless it's an EV
cert" (for whatever that's worth).

Right now, that "s" means "give an annoying warning if there's not a
blessed cert, and hard fail if there's no encryption at all", which is
rarely the semantics people actually intend.

With HTTP/2 and Let's Encrypt and Chrome suggesting that the annoying
warning will start appearing for all unencrypted sites in the medium
future, automated DV certs should soon be the minimum "you have to be
this tall to play on this Internet" (mumble servers without names
mumble), but it may still be useful to distinguish security levels above
the minimum in some cases.

   - Ian
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere harmful

2015-04-24 Thread yan
To be clear, Tim is talking about "HTTPS Everywhere" in general, not the 
browser extension!


On 4/24/15 8:05 PM, Mike Perry wrote:

Maciej Soltysiak:

http://www.w3.org/DesignIssues/Security-NotTheS.html


The problem with his argument is that the web (and any protocol, really)
needs a way to demand a hard guarantee that a request must proceed over
a secure transport layer. If that layer is not available, the request
must fail. Anything short of that is opportunistic security, and by
definition not effective against an active attacker**.



We (the W3C technical architecture group) talked to TBL in person about 
this yesterday. To be clear, in TBL's proposal, the HTTPS scheme still 
exists and works as-is; it's just HTTP that changes.



I suspect what Tim Berners-Lee is actually annoyed with is Mixed Content
Blocking and its tendency to impede upgrade to HTTPS rather than
encourage it (due to blocking HSTS-upgraded URLs and addon redirect
HTTPS upgrades as if they were HTTP URLs, rather than allowing them to
be treated as first-class HTTPS urls). With that, I sympathize. Mixed
Content Blocking seems to be doing more harm than good in terms of
encouraging HTTPS transition, and has forced HTTPS-Everywhere to have to
disable thousands of HTTPS upgrade rules due to site breakage from
improperly blocked "Mixed Content".

Unfortunately, it seems that conflating the Mixed Content Blocking issue
with the HTTPS namespace issue will likely distract the standards
community long enough to delay development of proper solutions to HTTPS
migration (like an improved form of HSTS that addresses known issues
with Mixed Content Blocking: https://w3c.github.io/webappsec/specs/upgrade/).



I think you're right that a *lot* of TBL's frustration is from mixed 
content blocking, a sentiment which many of us share. The "Upgrade 
Insecure Requests" doc is a good start, but perhaps it could be more 
aggressive with upgrades. Two ideas I left for Mike West on my review of 
the spec:


1. If a subresource is successfully upgraded on foo.com, remember this 
and automatically upgrade subresources with the same host on bar.com in 
the future.
2. Make a header that lets a host indicate that it should be upgraded 
whenever it's a subresource, regardless of whether the embedding page 
has set the CSP upgrade header. Sort of like HSTS if HSTS actually 
happened *before* mixed content blocking.


Both of these can obviously be abused to fingerprint users, 
unfortunately (in the same way that HSTS can).



Forgive me if I do my best to avoid this distraction myself.



Forgiven. :)




** Sure, there could be a pile of new attribute flags that could be set
on every HTML resource tag that says the resource must use a "secure
http:" channel if the parent document happened to load over a secure
channel, but the net engineering effort of deploying that correctly far
exceeds the effort needed to mitigate the namespace fragmentation
issues that Tim Berners-Lee is seemingly so concerned about.




___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] HTTPS Everywhere harmful

2015-04-24 Thread Mike Perry
Maciej Soltysiak:
> http://www.w3.org/DesignIssues/Security-NotTheS.html

The problem with his argument is that the web (and any protocol, really)
needs a way to demand a hard guarantee that a request must proceed over
a secure transport layer. If that layer is not available, the request
must fail. Anything short of that is opportunistic security, and by
definition not effective against an active attacker**.

I suspect what Tim Berners-Lee is actually annoyed with is Mixed Content
Blocking and its tendency to impede upgrade to HTTPS rather than
encourage it (due to blocking HSTS-upgraded URLs and addon redirect
HTTPS upgrades as if they were HTTP URLs, rather than allowing them to
be treated as first-class HTTPS urls). With that, I sympathize. Mixed
Content Blocking seems to be doing more harm than good in terms of
encouraging HTTPS transition, and has forced HTTPS-Everywhere to have to
disable thousands of HTTPS upgrade rules due to site breakage from
improperly blocked "Mixed Content".

Unfortunately, it seems that conflating the Mixed Content Blocking issue
with the HTTPS namespace issue will likely distract the standards
community long enough to delay development of proper solutions to HTTPS
migration (like an improved form of HSTS that addresses known issues
with Mixed Content Blocking: https://w3c.github.io/webappsec/specs/upgrade/).

Forgive me if I do my best to avoid this distraction myself.



** Sure, there could be a pile of new attribute flags that could be set
on every HTML resource tag that says the resource must use a "secure
http:" channel if the parent document happened to load over a secure
channel, but the net engineering effort of deploying that correctly far
exceeds the effort needed to mitigate the namespace fragmentation
issues that Tim Berners-Lee is seemingly so concerned about.


-- 
Mike Perry


signature.asc
Description: Digital signature
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


[tor-dev] HTTPS Everywhere harmful

2015-04-24 Thread Maciej Soltysiak
http://www.w3.org/DesignIssues/Security-NotTheS.html

Maciej
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere" extension

2014-11-09 Thread rufo
This might be a good use for the Alternate-Protocol header currently
used by Chrome to allow opportunistic upgrade from HTTP to SPDY.

See also the Alt-Svc header proposed by the HTTPbis WG earlier this year.
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere" extension

2014-11-03 Thread teor
Hi All,

A "privacy everywhere" solution could have two components:
1. the  HSTS-like "always open this site in .onion" policy already discussed; 
and
2. an AppLinks or AppLinks-like[1] header that specifies a preferred app and/or 
URL for Tor, I2P, namecoin, …

The first handles the situation where you're already in the Tor browser, I2P, 
namecoin, and simply wish to pin the .onion etc. URL for that site.

The second handles the situation where you're browsing the web in your standard 
browser, but want to switch to a .onion site in the Tor browser if one is 
available (or the equivalent namecoin or I2P action). AppLinks is mainly 
designed for mobile platforms, but has Windows schemes as well.

I could imagine schemes like:
al:onion:urlhttps://facebookcorewwwi.onion
al:onion:attribute  value

al:namecoin:url   https://...
al:namecoin:attribute  value

al:i2p:urlhttps://...
al:i2p:attribute  value

What do you think?
I wonder if this is helpful, or could just end up being out of scope, 
duplicating effort, or abusing the AppLinks protocol design (which is focused 
on an app per platform, not multiple options for alternate URLs).

T


[1]: http://applinks.org/documentation/#applinknavigationprotocol

teor
pgp 0xABFED1AC
hkp://pgp.mit.edu/
https://gist.github.com/teor2345/d033b8ce0a99adbc89c5
http://0bin.net/paste/Mu92kPyphK0bqmbA#Zvt3gzMrSCAwDN6GKsUk7Q8G-eG+Y+BLpe7wtmU66Mx

> On 3 Nov 2014, at 23:00, tor-dev-requ...@lists.torproject.org wrote:
> Date: Mon, 03 Nov 2014 00:12:53 -0600
> From: Jeremy Rand 
> To: tor-dev@lists.torproject.org,  https-everywhere
>    , namec...@googlegroups.com
> Subject: Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere"
> 
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hi Yan,
> 
> Namecoin would definitely be interested in something similar (we were
> actually discussing the possibility of exactly this yesterday).  Maybe
> we could produce a list of relevant projects that would benefit from
> this?  (The three that come to mind immediately are Tor, I2P, and
> Namecoin, but there may be others.)  If there are more than a few
> projects that would benefit, then it might be interesting to find a
> neutral format for the HTTP header, so that we wouldn't have to list
> all the supported TLD's explicitly in the spec.
> 
> (CCing to Namecoin dev list.)
> 
> - -Jeremy Rand
> Lead Application Engineer, Namecoin Project
> 
>> On 11/02/2014 11:48 PM, yan wrote:
>> +tor-dev. tl;dr: Would be nice if there were an HTTP response
>> header that allows HTTPS servers to indicate their .onion domain
>> names so that HTTPS Everywhere can automatically redirect to the
>> .onion version in the future if the user chooses a "use THS when
>> available" preference.
>> 
>> I imagine the header semantics and processing would be similar to
>> HSTS. It would only be noted when sent over TLS and have the
>> max-age and include-subdomains fields.
>> 
>> -yan
>> 
>> yan wrote:
>>> Hi all,
>>> 
>>> Some people have requested for the "Darkweb Everywhere" extension
>>> [1] to be integrated into HTTPS Everywhere. This is an extension
>>> for Tor Browser that redirects users to the Tor Hidden Service
>>> version of a website when possible.
>>> 
>>> I'm supportive of the idea; however, I'm worried that since
>>> .onion domain names are usually unrelated to a site's regular
>>> domain name, a malicious ruleset would be hard to detect. AFAIK
>>> Darkweb Everywhere only defends against this by publishing a doc
>>> in their Github repo that cites evidence for each ruleset [2].
>>> 
>>> What if, instead, we asked website owners to send an HTTP header
>>> that indicates the Tor Hidden Service version of their website?
>>> Then HTTPS Everywhere could cache the result (like HSTS) and
>>> redirect to the THS version automatically in the future if the
>>> user opts-in.
>>> 
>>> If this is something that EFF/Tor would be willing to advocate
>>> for, I would be happy to draft a specification for the header
>>> syntax and intended UA behavior.
>>> 
>>> Thanks, Yan
>>> 
>>> 
>>> [1] https://github.com/chris-barry/darkweb-everywhere/ [2] 
>>> https://github.com/chris-barry/darkweb-everywhere/blob/master/doc/EVIDENCE.md
> ___
>>> HTTPS-Everywhere mailing list https-everywh...@lists.eff.org 
>>> https://lists.eff.org/mailman/listinfo/https-everywhere
>> 
>> _

Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere" extension

2014-11-03 Thread Артур Истомин
On Mon, Nov 03, 2014 at 05:48:03AM +, yan wrote:
> +tor-dev. tl;dr: Would be nice if there were an HTTP response header
> that allows HTTPS servers to indicate their .onion domain names so that
> HTTPS Everywhere can automatically redirect to the .onion version in the
> future if the user chooses a "use THS when available" preference.
> 
> I imagine the header semantics and processing would be similar to HSTS.
> It would only be noted when sent over TLS and have the max-age and
> include-subdomains fields.

I think "darkweb" inappropriate name from marketing/PR point of view.
IMHO RenovatedWWW Everywhere more appropriate :)
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere" extension

2014-11-02 Thread Jeremy Rand
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi Yan,

Namecoin would definitely be interested in something similar (we were
actually discussing the possibility of exactly this yesterday).  Maybe
we could produce a list of relevant projects that would benefit from
this?  (The three that come to mind immediately are Tor, I2P, and
Namecoin, but there may be others.)  If there are more than a few
projects that would benefit, then it might be interesting to find a
neutral format for the HTTP header, so that we wouldn't have to list
all the supported TLD's explicitly in the spec.

(CCing to Namecoin dev list.)

- -Jeremy Rand
Lead Application Engineer, Namecoin Project

On 11/02/2014 11:48 PM, yan wrote:
> +tor-dev. tl;dr: Would be nice if there were an HTTP response
> header that allows HTTPS servers to indicate their .onion domain
> names so that HTTPS Everywhere can automatically redirect to the
> .onion version in the future if the user chooses a "use THS when
> available" preference.
> 
> I imagine the header semantics and processing would be similar to
> HSTS. It would only be noted when sent over TLS and have the
> max-age and include-subdomains fields.
> 
> -yan
> 
> yan wrote:
>> Hi all,
>> 
>> Some people have requested for the "Darkweb Everywhere" extension
>> [1] to be integrated into HTTPS Everywhere. This is an extension
>> for Tor Browser that redirects users to the Tor Hidden Service
>> version of a website when possible.
>> 
>> I'm supportive of the idea; however, I'm worried that since
>> .onion domain names are usually unrelated to a site's regular
>> domain name, a malicious ruleset would be hard to detect. AFAIK
>> Darkweb Everywhere only defends against this by publishing a doc
>> in their Github repo that cites evidence for each ruleset [2].
>> 
>> What if, instead, we asked website owners to send an HTTP header
>> that indicates the Tor Hidden Service version of their website?
>> Then HTTPS Everywhere could cache the result (like HSTS) and
>> redirect to the THS version automatically in the future if the
>> user opts-in.
>> 
>> If this is something that EFF/Tor would be willing to advocate
>> for, I would be happy to draft a specification for the header
>> syntax and intended UA behavior.
>> 
>> Thanks, Yan
>> 
>> 
>> [1] https://github.com/chris-barry/darkweb-everywhere/ [2] 
>> https://github.com/chris-barry/darkweb-everywhere/blob/master/doc/EVIDENCE.md
>>
>> 
___
>> HTTPS-Everywhere mailing list https-everywh...@lists.eff.org 
>> https://lists.eff.org/mailman/listinfo/https-everywhere
>> 
> 
> ___ tor-dev mailing
> list tor-dev@lists.torproject.org 
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
> 

-BEGIN PGP SIGNATURE-
Version: GnuPG v1

iQEcBAEBAgAGBQJUVxzXAAoJEFgMI9bDV/9qY3UIAJrl5LI/1OHJngu1W9DsLAjr
nh+Csnm66z5tQTwiwva1Tb4b6trHv4KkHItaTm0cI44mQNsd+YEkh0oRBTSNNcRm
HY0BDn2pqTlQPN9bWvclGEtCacevCbaQiZgPpxPa+1crtavto4VAnv0/EI85QVAe
XHUNBeAHmB3qNATXsVJ61oksWlU/x8ao62fB13cUd2fVyaasWz4PPsAJ9n3TkdYG
/el7mAuM6XdA1fFaGFd1ta0jRuER2VgKQvJQctu/6a/9jiNlib3YmMOOxvF0WR+/
foUdhFkNCmRWwxqnxFDiKM0ilRLjTQ47CYRkgkqD4azPlkNvUULbO3KhaWPB9/4=
=rUsH
-END PGP SIGNATURE-
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] "darkweb everywhere" extension

2014-11-02 Thread yan
+tor-dev. tl;dr: Would be nice if there were an HTTP response header
that allows HTTPS servers to indicate their .onion domain names so that
HTTPS Everywhere can automatically redirect to the .onion version in the
future if the user chooses a "use THS when available" preference.

I imagine the header semantics and processing would be similar to HSTS.
It would only be noted when sent over TLS and have the max-age and
include-subdomains fields.

-yan

yan wrote:
> Hi all,
> 
> Some people have requested for the "Darkweb Everywhere" extension [1] to
> be integrated into HTTPS Everywhere. This is an extension for Tor
> Browser that redirects users to the Tor Hidden Service version of a
> website when possible.
> 
> I'm supportive of the idea; however, I'm worried that since .onion
> domain names are usually unrelated to a site's regular domain name, a
> malicious ruleset would be hard to detect. AFAIK Darkweb Everywhere only
> defends against this by publishing a doc in their Github repo that cites
> evidence for each ruleset [2].
> 
> What if, instead, we asked website owners to send an HTTP header that
> indicates the Tor Hidden Service version of their website? Then HTTPS
> Everywhere could cache the result (like HSTS) and redirect to the THS
> version automatically in the future if the user opts-in.
> 
> If this is something that EFF/Tor would be willing to advocate for, I
> would be happy to draft a specification for the header syntax and
> intended UA behavior.
> 
> Thanks,
> Yan
> 
> 
> [1] https://github.com/chris-barry/darkweb-everywhere/
> [2]
> https://github.com/chris-barry/darkweb-everywhere/blob/master/doc/EVIDENCE.md
> ___
> HTTPS-Everywhere mailing list
> https-everywh...@lists.eff.org
> https://lists.eff.org/mailman/listinfo/https-everywhere
> 

___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] [GSoC] HTTPS Everywhere secure ruleset update mechanism update

2014-07-08 Thread Jeroen Massar
On 2014-07-08 12:47, Yan Zhu wrote:
> (resending to tor-dev with tp.o email address)
> 
> On 07/08/2014 03:42 AM, Yan Zhu wrote:
>> On 07/08/2014 12:07 AM, Jeroen Massar wrote:
>>> On 2014-07-07 20:40, Red wrote:
>>> [.. lots of cool work being worked on ..]
>>>
>>> Hi Zack,
>>>
>>> Seems you are doing lots of cool stuff ;)
>>>
>>> But I am one of those strange people who really hate it that every
>>> separate tool has their own updater (which can be used for tracking a
>>> user, as the set of updater tools polling servers makes a fingerprint in
>>> the same way other flows make a fingerprint).
>>
>> Hi Jeroen,
>>
>> This makes a lot of sense. I'm aware of the fingerprintability concern,
>> and EFF tech projects generally try to mitigate it by polling the update
>> servers at randomized intervals over fresh Tor circuits if possible. For
>> this project, we initially proposed polling for an update when the
>> browser starts and every 3 hours plus some random, evenly-distributed
>> number of milliseconds between 0 and 30. I'm curious if others have
>> more refined suggestions!

When the update happens over Tor you are mostly fine. But then you have
to make sure that the update happens over Tor. That is fine for Tails,
but not guaranteed for TBB.

Hence, my concern is for leaked connections outside of Tor. Eg, when
connecting to a wireless network at Starbucks. The moment one has a
forced VPN/Tor setup that one trusts, it is less of an issue.

If somebody can fingerprint timing info in Tor, then well, we have
bigger problems there ;)

(and indeed, having the updates come in through either Apple App Store,
Debian's APT repos etc, is an advantage as that only tells an adversary
"hey another OSX/Debian user" and not much else; oh and yes, app store
updating is disabled too on my hosts ;)


>>> And thus I run Little Snitch and block those updates. Till I deem it a
>>> good time for the update to be done and trigger it manually.
>>>
>>> As such, when you get to the stage of adding features, it would be good
>>> if there was:
>>>  - an option to disable the auto fetching
>>
>> Yes, this would be fairly easy to add.
>>
>>>  - an option to trigger the fetching
>>
>> Probably also easy.
>>
>>>  - to feed the update mechanism with a pre-fetched file
>>>(eg provided through a different update mechanism)
>>
>> Since the update mechanism is just an XHR that downloads a new ruleset
>> library from a hardcoded static URL and replaces the existing one in the
>> Firefox profile directory, you could fetch-and-replace this manually via
>> any number of mechanisms. :)

Indeed. Thus it would be good if the system allows that.

>> Also, the ruleset libraries will still ship with extension updates, so
>> you could disable ruleset updates and just wait for the next HTTPS
>> Everywhere release.

Yes, that might not be the best method. Especiallly when you get it from
a 'stable' source (eg TBB) that one does not update every once in a while.

Note that I see HTTPS Everywhere being used for other purposes than just
the standard checks it performs today, and then the updates might have
to be a lot more frequent than the software update happens.

Greets,
 Jeroen


___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] [GSoC] HTTPS Everywhere secure ruleset update mechanism update

2014-07-08 Thread Yan Zhu
(resending to tor-dev with tp.o email address)

On 07/08/2014 03:30 AM, Yan Zhu wrote:
> On 07/08/2014 02:55 AM, Ben Laurie wrote:
>> On 7 July 2014 19:40, Red  wrote:
>>> Despite the fact that the process for producing the signature in
>>> question[2] seemed to work fine- Openssl was able to generate and verify
>>> the signature, the testing code calling the verifyData[3] function used
>>> for verification was returning an undocumented NS_ERROR_FAILURE
>>> exception.  I had spent a great deal of time asking for support in
>>> relevant Firefox extension development IRC channels, reading source code
>>> from unit tests for the nsIDataSignatureVerifier component, and
>>> experimenting with alternative openssl commands in order to try to
>>> figure out why this error was occurring.
>>
>> Looking at the pk1sign source, it looks like the signature needs to be
>> in base64. Was that what you were using?
>>
>> Do you have a test case that fails using command line tools?
> 
> I think Zack's original failing test case was generated via something like:
> $ openssl rsautl -sign -in update.digest -out signtmp.sig -inkey privkey.pem
> $ openssl base64 -in signtmp.sig -out update.json.sig
> 
> as described in the original spec that we wrote:
> https://github.com/redwire/https-everywhere/blob/makeJSONManifest/doc/updateJSONSpec.md
> 
> Here is the diff between the failing test and the passing test:
> https://github.com/redwire/https-everywhere/commit/8b3c85d9d90d679e8b69970173db9f3185fa44c3.
> I generated the data for the passing test with pk1sign.
> 
> The documentation for nsIDataSignatureVerifier does not really describe
> the expected data format for the signature [1], so it took a while to
> figure out that it expects a very specialized form [2].
> 
> [1]
> https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIDataSignatureVerifier
> [2] https://bugzilla.mozilla.org/show_bug.cgi?id=685852#c0
> 
> 
>> ___
>> tor-dev mailing list
>> tor-dev@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>>
> 
> 
> 
> 
> ___
> HTTPS-Everywhere mailing list
> https-everywh...@lists.eff.org
> https://lists.eff.org/mailman/listinfo/https-everywhere
> 


-- 
Yan Zhu  , 
Staff Technologist
Electronic Frontier Foundation  https://www.eff.org
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x134
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] [GSoC] HTTPS Everywhere secure ruleset update mechanism update

2014-07-08 Thread Yan Zhu
(resending to tor-dev with tp.o email address)

On 07/08/2014 03:42 AM, Yan Zhu wrote:
> On 07/08/2014 12:07 AM, Jeroen Massar wrote:
>> On 2014-07-07 20:40, Red wrote:
>> [.. lots of cool work being worked on ..]
>>
>> Hi Zack,
>>
>> Seems you are doing lots of cool stuff ;)
>>
>> But I am one of those strange people who really hate it that every
>> separate tool has their own updater (which can be used for tracking a
>> user, as the set of updater tools polling servers makes a fingerprint in
>> the same way other flows make a fingerprint).
> 
> Hi Jeroen,
> 
> This makes a lot of sense. I'm aware of the fingerprintability concern,
> and EFF tech projects generally try to mitigate it by polling the update
> servers at randomized intervals over fresh Tor circuits if possible. For
> this project, we initially proposed polling for an update when the
> browser starts and every 3 hours plus some random, evenly-distributed
> number of milliseconds between 0 and 30. I'm curious if others have
> more refined suggestions!
> 
>>
>> And thus I run Little Snitch and block those updates. Till I deem it a
>> good time for the update to be done and trigger it manually.
>>
>> As such, when you get to the stage of adding features, it would be good
>> if there was:
>>  - an option to disable the auto fetching
> 
> Yes, this would be fairly easy to add.
> 
>>  - an option to trigger the fetching
> 
> Probably also easy.
> 
>>  - to feed the update mechanism with a pre-fetched file
>>(eg provided through a different update mechanism)
> 
> Since the update mechanism is just an XHR that downloads a new ruleset
> library from a hardcoded static URL and replaces the existing one in the
> Firefox profile directory, you could fetch-and-replace this manually via
> any number of mechanisms. :)
> 
> Also, the ruleset libraries will still ship with extension updates, so
> you could disable ruleset updates and just wait for the next HTTPS
> Everywhere release.
> 
> -Yan
> 
>>
>> Greets,
>>  Jeroen
>>
>> ___
>> tor-dev mailing list
>> tor-dev@lists.torproject.org
>> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
>>
> 
> 
> 
> 
> ___
> HTTPS-Everywhere mailing list
> https-everywh...@lists.eff.org
> https://lists.eff.org/mailman/listinfo/https-everywhere
> 


-- 
Yan Zhu  , 
Staff Technologist
Electronic Frontier Foundation  https://www.eff.org
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x134
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev


Re: [tor-dev] [HTTPS-Everywhere] GSoC report - Zack Mullaly - HTTPS Everywhere secure ruleset update mechanism

2014-06-15 Thread Yan Zhu
(Trying again with my tp.o email address)

On 06/15/2014 02:05 PM, Yan Zhu wrote:
> It's unclear whether this message went through to tor-dev (can't find it
> in the archives), but I've added this update to
> https://trac.torproject.org/projects/tor/wiki/doc/gsoc.
> 
> On 06/13/2014 05:06 PM, Red wrote:
>> Hello, everyone!
>> I apologize for the fact that this is coming in late, but here is a
>> summary of my progress and plans thus far in developing a secure ruleset
>> update mechanism for the HTTPS Everywhere browser extension.
>>
>> The specification document detailing how the ruleset updater will
>> function has been perhaps the greatest focus for me until now. The
>> document is currently hosted on Github as a gist[1], and currently
>> details the format for the JSON document the extension will fetch to
>> determine whether the update information it receives is authentic and
>> relevant.
>>
>> A second task I have been working on is the creation of a utility[2]
>> used to automate much of the process of building the update.json file
>> contents outlined by [1]. A lot of the work done here so far has been
>> experimental, but it is already providing some utility for composing
>> data that can be used for testing purposes.
>>
>> The third thing I have been working on is the actual implementation of
>> the ruleset updater[3].  There are to be some changes to the spec that
>> will be reflected in this code in the coming week, but the
>> implementation so far is very close to being ready to test.
>>
>> In the last week, a lot of discussion has occurred centered around
>> improving the specification for the ruleset update mechanism and how the
>> update.json file and signing thereof should function and be written.  I
>> have posted my weekly meeting notes to another gist[4] which I will from
>> today onwards be keeping up to date with my weekly notes so that they
>> will be publicly available and well-formatted.  In summary, my upcoming
>> work will involve updating the update.json spec to reflect the
>> discussion being had on the https-everywhere mailing list and between
>> myself and my mentor, Yan.  I will then focus on updating the extension
>> code as well as the utility I have been working on to reflect the
>> changes to the spec.  I will then move on to testing the signature
>> verification method locally by creating example documents and a Python
>> script to verify the signature.  I will also be setting up a testing
>> environment to properly test my work on the ruleset update mechanism.
>>
>> My work can be more closely followed on Github- specifically, my fork of
>> the official HTTPS-Everywhere repository[5].  The code I have been
>> working on resides in my "makeJSONManifest" and "rulesetUpdating"
>> branches.  You can also follow the discussion on the https-everywhere
>> mailing list, and are welcome to join in mine and Yan's weekly meetings
>> in #https-everywhere on irc.oftc.net at 11:00AM Pacific Time on
>> Fridays.  We're happy to have people chime in with ideas, and commentary
>> in IRC, the mailing list, and on Github is welcome!
>>
>> [1]: https://gist.github.com/redwire/2e1d8377ea58e43edb40
>> [2]:
>> https://github.com/redwire/https-everywhere/blob/makeJSONManifest/utils/ruleset_update_manifest.py
>> [3]:
>> https://github.com/redwire/https-everywhere/blob/rulesetUpdating/src/chrome/content/code/rulesetUpdate.js
>> [4]: https://gist.github.com/redwire/b62f03905a826e79947a
>> [5]: https://github.com/redwire/https-everywhere
>>
>>
>>
>> ___
>> HTTPS-Everywhere mailing list
>> https-everywh...@lists.eff.org
>> https://lists.eff.org/mailman/listinfo/https-everywhere
>>
> 
> 


-- 
Yan Zhu  , 
Staff Technologist
Electronic Frontier Foundation  https://www.eff.org
815 Eddy Street, San Francisco, CA  94109   +1 415 436 9333 x134
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev