[Privoxy-devel] HTTPS filtering in Privoxy
    Lee 
    ler762 at gmail.com
       
    Thu May 18 16:24:24 UTC 2017
    
    
  
On 5/18/17, Fabian Keil <fk at fabiankeil.de> wrote:
> Fabian Keil <fk at fabiankeil.de> wrote:
>
>> Vašek Švec <va.svec at gmail.com> wrote:
>>
>> > file with patches (git format-patch) is in attachment. I hereby release
>> > this code under the GNU GPLv2 or later.
>>
>> Thanks a lot for the patch.
>>
>> Unfortunately Mailman stripped it <.. snip ..>
>
> In the meantime the patch is available at:
> https://www.fabiankeil.de/tmp/privoxy-tls-ssl-changes-by-Vaclav-Svec.diff
Very cool!  You've seen these - right?
  https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2017-01
  https://www.us-cert.gov/ncas/alerts/TA17-075A
Do you address any of the concerns raised?  I'm especially interested in
    Many HTTPS
  security features expect connections to be end-to-end by
  mixing the HTTP and TLS layers, and by implementing
  HTTPS features in browser code rather than in TLS libraries.
  For example, to overcome weaknesses in existing revocation
  protocols, Firefox ships with OneCRL [43] and Chrome,
  CRLSets [24]. Both of these solutions increase browser security
  in the typical end-to-end case. However, these solutions provide
  no protection in the presence of a TLS proxy and because the
  solution is not part of the TLS protocol itself, TLS libraries
  do not implement these safe revocation checks.
Regards,
Lee
    
    
More information about the Privoxy-devel
mailing list