-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 17/11/13 14:22, dardok wrote: > Hi, > > I've been reading about Selenium web-browser driver thing and I > consider that is not very handy to do what an HTTP PT client side > needs, that is to forge HTTP requests and embbed the TOR traffic into > these HTTP requests. > > It is more oriented to emulated a web user interaction with a real > browser (such as firefox, chrome, opera, ie, ...) and the interaction > and testing of web apps from these browsers. > > Also I cannot see how to handle the responses from the server-side > using this thing. Few functions seem to be interesting regarding HTTP > protocol handling and manipulation, as I said before most of the > functions present are related with the user interaction. > > The Python version can be installed easily: pip install selenium > > The already implemented functions can be read on this file: > /usr/share/pyshared/selenium/selenium.py > > I didn't find any useful function to allow a HTTP PT (client side) > embed the TOR traffic into HTTP requests (maybe some cookie function > related) and extract the information sent by the HTTP PT server side > (maybe some get_body_text() or get_text() funtion). > > So I am ready to consider that this option is not be useful to > implement a HTTP PT client side. Anyway, I would like to discuss this > point with someone interested in this topic. >
Hey dardok, I am not an expert with any of these technologies at all, but perhaps you could look into this? https://addons.mozilla.org/en-us/firefox/addon/mozrepl/ It's an extension you install that then lets you telnet-connect to it and control firefox - which means you could do that from a PT. (There might be an even cleaner interface for programmable access, telnet is just what's advertised on the front page.) https://github.com/bard/mozrepl/wiki/Tutorial This shows an example on how to visit a website (the remote bridge maybe) and get information out of the resulting page. X - -- GPG: 4096R/1318EFAC5FBBDBCE git://github.com/infinity0/pubkeys.git -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) Comment: Using GnuPG with Icedove - http://www.enigmail.net/ iQIcBAEBCAAGBQJSirUsAAoJEIYN7zuPZQt5yGcQAJbQjkL2AXOwuGD5T4Zluop2 fF3PQW3MmUPmazlC7YmzNzjIvGEuBzkG4qc7wmCjo+rHuJqkDADMNlomdp9zxbjQ ziRntZS7b87skkZ+dXg+TK2z30zJlwcJc0SW5XnWo+v45GgxYhJ2UFGP0fxpYBI0 ZScFXXp2TIEkvwbqsewseW0K9w3/rYUv2wQova+izeVyqVkPlzg0B5zhpav2jbWq c0TqRDGZsY9oBIdh+GLiTO1V1/NZXFTNkfS1iLJhqqJYeosOWiuGQVOzc2w/7yN3 VxIG1dldbsIgjci59cc1/FgqdrdTdLwwBcp9HexRI8jrLLwbDBpY61OgchTBhlWf EnrsIZZCIAZzAcPGqwsBTFGXxVcTjwtEokPZdDORcrBHqv3DNKKgvRcT+aIX+/AH dTinyRaaOh1c5F+6wuddDqd1sgLxdaiuZRNmqmGa4gX7ZXxs+SwlB+9nVWyv6r+e ZT6vxinKrjPeC4vCRIpRISsi1T6bogeugsX9+iE43f1vh2HrTL+AuxStvFKCy55L fXVhItmvI6VbyI5XpRsj+YuLLmpRB8+j7/W6Jg5Gc1/uFbwpIH+mxBKbUV9hE47F FOmq0qIftAhGOQAFXjdczooHSJ1AZeiVkFh6gW/6lbmnjga9NH8eVMIuGPjvA8yk 3JWGDkyUUToIMSN6WYGS =tMSt -----END PGP SIGNATURE----- _______________________________________________ tor-dev mailing list tor-dev@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev