5
edits
m (properly wikify list) |
|||
| Line 6: | Line 6: | ||
The protocol consists of four different HTTP requests: | The protocol consists of four different HTTP requests: | ||
* '''/getkey''': This request requires SSL support. It provides the client with a private key for confidential communication with the server. | |||
* '''/lookup''': Asks the server to render a verdict on the provided target URL. This request needs to be encrypted with the private key from above. | |||
* '''/update''': The client provides a list of tables that it wants the server to update. The server either provides the full content of the current tables or incremental updates to bring the client's tables up to the current version. | |||
* '''/report''': Used to report when users visit phishing pages and if they decided to heed the warning or ignore it. | |||
== Data Encoding Standards == | == Data Encoding Standards == | ||
edits