Open
Description
Issue:
- In some corporate environment the browser client have a new Certification Authority SSL. This permit SSL mitm by the corporate firewall, and works like a proxy even in HTTPS connection.
- hiddenservice.tor2web.org bring to a DNS leak by the client
descriptive solution:
- tor2web may support a special hostname x.tor2web.org and wait via POST the hidden service request and the accessed URL, avoiding both SSL proxy recording and DNS leaking.
Feature description:
when "x." subdomain is connected, all the parameters expected via GET and the destination host, are expected via POST
security and scalability
- This would not provide a complete security against this kind of threat, because having SSL CA compromised would bring to a complete traffic interception, but would be almost a nice way to avoid the proxy logging (and start in support special security trigger selected by the hostname)
- by hypothesis, x.tor2web.org would support this feature, and in future y.tor2web.org other, and then k.tor2web.org ... this is out of scope in this release, but develop "x" with this mindset would help future extensions