On Wed, Mar 22, 2017, at 08:23 AM, Michael Rogers wrote:
> On 06/09/16 10:48, Hans-Christoph Steiner wrote:
> > 
> > The Briar folks are working on getting HTTP connections on Android to go
> > through Tor via SOCKS.  They used a custom SocketFactory and Socket
> > subclasses, with their own SOCKS handling.
> > 
> > https://code.briarproject.org/akwizgran/briar/merge_requests/308
> > 
> > Could we use this approach in NetCipher?  I think Torsten that said this
> > approach requires android-14 at least, but we could just use HTTP
> > proxies to support older platforms.
> 
> Hi guys,
> 
> Following up on an old thread to let you know that unfortunately the
> approach we found for getting OkHttp to use a SOCKS proxy isn't safe. In
> some cases OkHttp will try to resolve hostnames locally before creating
> sockets, which leaks DNS lookups to the local network. Cure53 found this
> in their recent audit of Briar. I'm currently trying to work out how big
> a change is required to fix this.

Do we need to implement or fork our own HTTP library to ensure safety?
Or is it just OkHttp itself that is the problem? I think Apache
HTTPClient is better, possibly Volley, as well?
_______________________________________________
List info: https://lists.mayfirst.org/mailman/listinfo/guardian-dev
To unsubscribe, email:  guardian-dev-unsubscr...@lists.mayfirst.org

Reply via email to