[tor-bugs] #9713 [EFF-HTTPS Everywhere]: Users report HTTPS Everywhere 0.development.11 in some sort of clients1.google.com loop?

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Sep 12 15:13:46 UTC 2013


#9713: Users report HTTPS Everywhere 0.development.11 in some sort of
clients1.google.com loop?
--------------------------------------+----------------------
     Reporter:  erinn                 |      Owner:  micahlee
         Type:  defect                |     Status:  assigned
     Priority:  normal                |  Milestone:
    Component:  EFF-HTTPS Everywhere  |    Version:
   Resolution:                        |   Keywords:
Actual Points:                        |  Parent ID:
       Points:                        |
--------------------------------------+----------------------

Comment (by cypherpunks):

 Google's SSL certificates now have an OCSP responder on
 http://clients1.google.com/ocsp (previously they didn't have an OCSP
 pointer).

 OCSP responses are signed and the OCSP responder serves on HTTPS as well:

 {{{
 curl
 https://clients1.google.com/ocsp/MG4wbDBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCAqfIRlqRC5FoiMwITAfBgkrBgEFBQcwAQIEEgQQBauuhzzvamPnjgfhvS7VVw==
 | hexdump -C
 }}}

 I don't know why things would go so wrong in the client when writing those
 requests.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9713#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list