[tor-bugs] #9713 [EFF-HTTPS Everywhere]: Users report HTTPS Everywhere 0.development.11 in some sort of clients1.google.com loop?
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Sep 12 15:13:46 UTC 2013
#9713: Users report HTTPS Everywhere 0.development.11 in some sort of
clients1.google.com loop?
--------------------------------------+----------------------
Reporter: erinn | Owner: micahlee
Type: defect | Status: assigned
Priority: normal | Milestone:
Component: EFF-HTTPS Everywhere | Version:
Resolution: | Keywords:
Actual Points: | Parent ID:
Points: |
--------------------------------------+----------------------
Comment (by cypherpunks):
Google's SSL certificates now have an OCSP responder on
http://clients1.google.com/ocsp (previously they didn't have an OCSP
pointer).
OCSP responses are signed and the OCSP responder serves on HTTPS as well:
{{{
curl
https://clients1.google.com/ocsp/MG4wbDBFMEMwQTAJBgUrDgMCGgUABBTy4Gr5hYodjXCbSRkjeqm1Gih+ZAQUSt0GFhu89mi1dvWBtrtiGrpagS8CCAqfIRlqRC5FoiMwITAfBgkrBgEFBQcwAQIEEgQQBauuhzzvamPnjgfhvS7VVw==
| hexdump -C
}}}
I don't know why things would go so wrong in the client when writing those
requests.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9713#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list