[tor-bugs] #11127 [BridgeDB]: reCaptcha verification is hardcoded to use plaintext HTTP
Tor Bug Tracker & Wiki
blackhole at torproject.org
Wed Mar 5 00:09:09 UTC 2014
#11127: reCaptcha verification is hardcoded to use plaintext HTTP
--------------------------+----------------------------
Reporter: isis | Owner: isis
Type: defect | Status: needs_review
Priority: major | Milestone:
Component: BridgeDB | Version:
Resolution: | Keywords: bridgedb-https
Actual Points: | Parent ID:
Points: |
--------------------------+----------------------------
Changes (by isis):
* status: new => needs_review
Comment:
I wrote
[https://gitweb.torproject.org/user/isis/bridgedb.git/shortlog/refs/heads/fix/11127
-recaptcha-ssl a Twisted reCaptcha client which only uses SSL]. It also
does full certificate chain verification, and cert hostname verification
on a per-request basis.
It's much faster. And it has full unittest coverage. :)
I left the methods for creating the
`bridgedb.crypto.SSLVerifyingContextFactory` and
`twisted.web.client.Agent` separate from the main reCaptcha API functions,
so we can use them for other requests. (For example, there is another
blocking HTTP request in `bridgedb.[R|c]aptcha.Recaptcha.get()`, which
obtains the CAPTCHA image and challenge string from the reCaptcha server,
that could easily benefit from this as well.) Possible this SSL client-
side stuff should be separate somewhere, but for now I just put it all in
`bridgedb.txrecaptcha` (except for
`bridgedb.crypto.SSLVerifyingContextFactory`.
Please review!
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/11127#comment:1>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list