[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Workaround for filtering/cybersitter



If I had experience with Netscape plugins and spare time, I'd
try it myself.  But here's my proposed solution.  

A plugin in Netscape intercepts all requests,  encrypt the URL
with a pubkey algorithm, encode the string base64, send it as GET input to
a proxy server.

The proxy server decodes and decrypts the URL, gets the requested page,
and returns it.  This beats out URL-based filtering.

Still need to figure out the specifics of key-exchange.  If we use
40-bit encryption, it's exportable, and it still works in our threat
model (ie. we don't care if the watchers figure out the URL a few hours
later).

To beat out dropping packets with unacceptable pattern in them, we
could use an SSL-based server as the proxy.

The plugin could even have a nice little on/off switch and a list
list of available proxies.

mark

-- 
[]  Mark Rogaski                    || "Computers save time like kudzu    [] 
[]  [email protected]               ||  prevents soil erosion."           [] 
[]  http://www.pobox.com/~wendigo/  ||           - [email protected]      []
[]  >> finger for PGP pubkey <<     ||                                    []