[HTTPS-Everywhere] Forward Secrecy Indicator

Libertas libertas at mykolab.com
Sun Jan 4 16:54:17 PST 2015


A forward secrecy indicator was mentioned as a potential project in this
ticket:

	https://trac.torproject.org/projects/tor/ticket/10071

I decided to write a quick demo to show how easy it is to detect forward
secrecy. Here it is, as a patch to the master branch in the
torproject.org repo:

	https://gist.github.com/plsql/89dd739cef1f6014e5ff

To try it, just clone the above-mentioned repo, apply the patch with
'git apply', run 'bash test.sh --justrun | grep mmcc', and do a little
trial browsing.

I'm not entirely sure what the diff at lines 13-14 in the patch means,
so be sure that it doesn't insidiously change anything.

There may be some weird SSL/TLS algorithms that I'm misclassifying. If
you know of any, please share. Also, I almost never write in Javascript,
so my style or technique may be a little basic. Also share any
suggestions you have in that regard.

Let me know what you think. If there's interest in this, I'd love to
work on it with someone else.

Thanks!

Libertas

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.eff.org/pipermail/https-everywhere/attachments/20150104/0f386623/attachment.sig>


More information about the HTTPS-Everywhere mailing list