On Sat, Mar 24, 2012 at 10:49 AM, Florent Daigniere <
nextgens at freenetproject.org> wrote:

> On Sat, Mar 24, 2012 at 08:42:33AM -0600, Zooko Wilcox-O'Hearn wrote:
> Hi Zooko,
>
> It was me... And the difference in betweek fproxy (the freenet web-gateway)
>  and what Tahoe-LAFS does is that we attempt to parse and filter the
> content.


Ah yes, this is true.  We employ a whitelist approach so that only parts of
the HTML DOM that we know to be safe get through.  So, for example,
anything that might cause the user's browser to ping a remote server is
verboten.  It seems to work well enough in practice (I don't recall anyone
ever finding a vulnerability in it).

But our threat model is quite different to Tahoe's, this type of thing may
not be a concern for you.

Ian.

-- 
Ian Clarke
Founder, The Freenet Project
Email: ian at freenetproject.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<https://emu.freenetproject.org/pipermail/tech/attachments/20120325/182fc580/attachment.html>

Reply via email to