Skip to content

Proxy trough static URL (es: http://x.tor2web.org) #34

Open
@vecna

Description

@vecna

Issue:

  • In some corporate environment the browser client have a new Certification Authority SSL. This permit SSL mitm by the corporate firewall, and works like a proxy even in HTTPS connection.
  • hiddenservice.tor2web.org bring to a DNS leak by the client

descriptive solution:

  • tor2web may support a special hostname x.tor2web.org and wait via POST the hidden service request and the accessed URL, avoiding both SSL proxy recording and DNS leaking.

Feature description:

when "x." subdomain is connected, all the parameters expected via GET and the destination host, are expected via POST

security and scalability

  • This would not provide a complete security against this kind of threat, because having SSL CA compromised would bring to a complete traffic interception, but would be almost a nice way to avoid the proxy logging (and start in support special security trigger selected by the hostname)
  • by hypothesis, x.tor2web.org would support this feature, and in future y.tor2web.org other, and then k.tor2web.org ... this is out of scope in this release, but develop "x" with this mindset would help future extensions

--- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/14807262-proxy-trough-static-url-es-http-x-tor2web-org?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F318575&utm_medium=issues&utm_source=github).

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions