A forward secrecy indicator was mentioned as a potential project in this
ticket:

        https://trac.torproject.org/projects/tor/ticket/10071

I decided to write a quick demo to show how easy it is to detect forward
secrecy. Here it is, as a patch to the master branch in the
torproject.org repo:

        https://gist.github.com/plsql/89dd739cef1f6014e5ff

To try it, just clone the above-mentioned repo, apply the patch with
'git apply', run 'bash test.sh --justrun | grep mmcc', and do a little
trial browsing.

I'm not entirely sure what the diff at lines 13-14 in the patch means,
so be sure that it doesn't insidiously change anything.

There may be some weird SSL/TLS algorithms that I'm misclassifying. If
you know of any, please share. Also, I almost never write in Javascript,
so my style or technique may be a little basic. Also share any
suggestions you have in that regard.

Let me know what you think. If there's interest in this, I'd love to
work on it with someone else.

Thanks!

Libertas

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
HTTPS-Everywhere mailing list
[email protected]
https://lists.eff.org/mailman/listinfo/https-everywhere

Reply via email to