aboutsummaryrefslogtreecommitdiff
path: root/proposals/131-verify-tor-usage.txt
diff options
context:
space:
mode:
authorSteven Murdoch <Steven.Murdoch@cl.cam.ac.uk>2008-03-19 10:49:33 +0000
committerSteven Murdoch <Steven.Murdoch@cl.cam.ac.uk>2008-03-19 10:49:33 +0000
commit985e8543a3586492b25311cd0573d51678f039c7 (patch)
tree24b32a62130667d9118215108b9763a8e0396d4d /proposals/131-verify-tor-usage.txt
parent51e9c4b45445dae0a26c2b4a21e6a726a9520287 (diff)
downloadtorspec-985e8543a3586492b25311cd0573d51678f039c7.tar.gz
torspec-985e8543a3586492b25311cd0573d51678f039c7.zip
Added Automatic Firefox Notification extension to the verify-tor-usage proposal (thanks Mike Perry)
svn:r14128
Diffstat (limited to 'proposals/131-verify-tor-usage.txt')
-rw-r--r--proposals/131-verify-tor-usage.txt35
1 files changed, 32 insertions, 3 deletions
diff --git a/proposals/131-verify-tor-usage.txt b/proposals/131-verify-tor-usage.txt
index 0620928..bbc0b36 100644
--- a/proposals/131-verify-tor-usage.txt
+++ b/proposals/131-verify-tor-usage.txt
@@ -68,7 +68,7 @@ Extensions:
configuration could include the following HTML:
<h2>Connection chain</h2>
<ul>
- <li>Tor 0.1.2.14-alpha
+ <li>Tor 0.1.2.14-alpha</li>
<!-- Tor Connectivity Check: success -->
</ul>
@@ -78,8 +78,8 @@ Extensions:
browser:
<h2>Connection chain
<ul>
- <li>Tor 0.1.2.14-alpha
- <li>Polipo version 1.0.4
+ <li>Tor 0.1.2.14-alpha</li>
+ <li>Polipo version 1.0.4</li>
<!-- Tor Connectivity Check: success -->
</ul>
@@ -92,6 +92,35 @@ Extensions:
loaded then the user will know that external connectivity through
Tor works.
+ Automatic Firefox Notification:
+
+ All forms of the website should return valid XHTML and have a
+ hidden link with an id attribute "TorCheckResult" and a target
+ property that can be queried to determine the result. For example,
+ a hidden link would convey success like this:
+
+ <a id="TorCheckResult" target="success" href="/"></a>
+
+ failure like this:
+
+ <a id="TorCheckResult" target="failure" href="/"></a>
+
+ and DNS leaks like this:
+
+ <a id="TorCheckResult" target="dnsleak" href="/"></a>
+
+ Firefox extensions such as Torbutton would then be able to
+ issue an XMLHttpRequest for the page and query the result
+ with resultXML.getElementById("TorCheckResult").target
+ to automatically report the Tor status to the user when
+ they first attempt to enable Tor activity, or whenever
+ they request a check from the extension preferences window.
+
+ If the check website is to be themed with heavy graphics and/or
+ extensive documentation, the check result itself should be
+ contained in a seperate lightweight iframe that extensions can
+ request via an alternate url.
+
Security and resiliency implications:
What attacks are possible?