Domain: vimeocdn.com
HTTPS Everywhere currently rewrites requests to vimeocdn.com (or its subdomains).
Embedded content loaded from third-party domains (for example, YouTube, Google Analytics, ad networks, or CDNs) may also be affected. You can test this by loading the web page in question in a browser with HTTPS Everywhere installed and pulling down the HTTPS Everywhere rules menu. This will show a list of HTTPS Everywhere rules that were applied as the page was loaded, including rules that might have affected embedded content from other domains.
The stable branch contains the following rules that are disabled by default (so very few users' browsing is likely to be affected by their action):
<!-- CDN buckets: - av.vimeo.com.edgesuite.net - a808.g.akamai.net - pdl.vimeocdn.com.edgesuite.net - a1189.g.akamai.net Problematic subdomains: - av (pdl.../crossdomain.xml restricts to port 80) - pdl (works, akamai) Partially covered subdomains: - developer (some pages redirect to http) - pdl (→ akamai) Fully covered subdomains: - (www.) - secure Default off per https://trac.torproject.org/projects/tor/ticket/7569 --><ruleset name="Vimeo (default off)" default_off="breaks some video embedding"> <target host="vimeo.com"/> <target host="*.vimeo.com"/> <exclusion pattern="^http://av\.vimeo\.com/crossdomain\.xml"/> <!--exclusion pattern="^http://developer\.vimeo\.com/($|\?|(apps|guidelines|help|player)($|[?/]))" /--> <exclusion pattern="^http://developer\.vimeo\.com/(?!apis(?:$|[?/])|favicon\.ico)"/> <target host="*.vimeocdn.com"/> <!-- Uses crossdomain.xml from s3.amazonaws.com, which sets secure="false" https://mail1.eff.org/pipermail/https-everywhere/2012-October/001583.html --> <exclusion pattern="^http://a\.vimeocdn\.com/p/flash/moogaloop/"/> <!-- We cannot secure streams because crossdomain.xml restricts to port 80 :( --> <exclusion pattern="^http://pdl\.vimeocdn\.com/(?!crossdomain\.xml)"/> <!-- Tracking cookies: --> <securecookie host="^\.(?:player\.)?vimeo\.com$" name="^__utm\w$"/> <rule from="^http://((?:developer|player|secure|www)\.)?vimeo\.com/" to="https://$1vimeo.com/"/> <rule from="^http://av\.vimeo\.com/" to="https://a248.e.akamai.net/f/808/9207/8m/av.vimeo.com/"/> <!-- a & b: Akamai --> <rule from="^http://(?:secure-)?([ab])\.vimeocdn\.com/" to="https://secure-$1.vimeocdn.com/"/> <rule from="^http://i\.vimeocdn\.com/" to="https://i.vimeocdn.com/"/> <rule from="^http://pdl\.vimeocdn\.com/" to="https://a248.e.akamai.net/f/1189/4415/8d/pdl.vimeocdn.com/"/> </ruleset>
The development branch contains the following rules that are disabled by default (so very few users' browsing is likely to be affected by their action):
<!-- Other Vimeo rulesets: - Vimeo_Pro.com.xml CDN buckets: - av.vimeo.com.edgesuite.net - a808.g.akamai.net - pdl.vimeocdn.com.edgesuite.net - a1189.g.akamai.net Problematic subdomains: - av (pdl.../crossdomain.xml restricts to port 80) - pdl (works, akamai) Partially covered subdomains: - developer (some pages redirect to http) - pdl (→ akamai) Fully covered subdomains: - (www.) - secure Insecure cookies are set for these hosts: - vimeo.com - www.vimeo.com Default off per https://trac.torproject.org/projects/tor/ticket/7569 --><ruleset name="Vimeo (default off)" default_off="breaks some video embedding"> <target host="vimeo.com"/> <target host="*.vimeo.com"/> <exclusion pattern="^http://av\.vimeo\.com/crossdomain\.xml"/> <!--exclusion pattern="^http://developer\.vimeo\.com/($|\?|(apps|guidelines|help|player)($|[?/]))" /--> <exclusion pattern="^http://developer\.vimeo\.com/(?!apis(?:$|[?/])|favicon\.ico)"/> <target host="*.vimeocdn.com"/> <!-- Uses crossdomain.xml from s3.amazonaws.com, which sets secure="false" https://mail1.eff.org/pipermail/https-everywhere/2012-October/001583.html --> <exclusion pattern="^http://a\.vimeocdn\.com/p/flash/moogaloop/"/> <!-- We cannot secure streams because crossdomain.xml restricts to port 80 :( --> <exclusion pattern="^http://pdl\.vimeocdn\.com/(?!crossdomain\.xml)"/> <!-- Not secured by server: --> <!--securecookie host="^(?:www\.)?vimeo\.com$" name="^clip_test_v2$" /--> <!-- Tracking cookies: --> <securecookie host="^\.(?:player\.)?vimeo\.com$" name="^__utm\w$"/> <rule from="^http://((?:developer|player|secure|www)\.)?vimeo\.com/" to="https://$1vimeo.com/"/> <rule from="^http://av\.vimeo\.com/" to="https://a248.e.akamai.net/f/808/9207/8m/av.vimeo.com/"/> <!-- a & b: Akamai --> <rule from="^http://(?:secure-)?([ab])\.vimeocdn\.com/" to="https://secure-$1.vimeocdn.com/"/> <rule from="^http://i\.vimeocdn\.com/" to="https://i.vimeocdn.com/"/> <rule from="^http://pdl\.vimeocdn\.com/" to="https://a248.e.akamai.net/f/1189/4415/8d/pdl.vimeocdn.com/"/> </ruleset>
The HTTPS Everywhere developers welcome corrections and updates to rules. Please see our developer information and documentation of the ruleset format. If filing a bug in the Tor Project's Trac bug tracker, you can use the shared username and password cypherpunks / writecode; please ensure that the bug is marked as applying to HTTPS Everywhere.
Information current as of:
current release 94ec7b6 2015-12-21 11:26:25 -0600;
next release f233a81 2015-12-27 17:05:17 -0800;
current release 94ec7b6 2015-12-21 11:26:25 -0600;
next release f233a81 2015-12-27 17:05:17 -0800;